May 10 00:48:25.083154 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:48:25.083197 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:48:25.083218 kernel: BIOS-provided physical RAM map: May 10 00:48:25.083229 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 10 00:48:25.083239 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 10 00:48:25.083248 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 10 00:48:25.083259 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffdafff] usable May 10 00:48:25.083269 kernel: BIOS-e820: [mem 0x000000007ffdb000-0x000000007fffffff] reserved May 10 00:48:25.083282 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 10 00:48:25.083291 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 10 00:48:25.083301 kernel: NX (Execute Disable) protection: active May 10 00:48:25.083311 kernel: SMBIOS 2.8 present. May 10 00:48:25.083323 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 May 10 00:48:25.083336 kernel: Hypervisor detected: KVM May 10 00:48:25.083351 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:48:25.083369 kernel: kvm-clock: cpu 0, msr 28196001, primary cpu clock May 10 00:48:25.083385 kernel: kvm-clock: using sched offset of 3566575351 cycles May 10 00:48:25.083403 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:48:25.083421 kernel: tsc: Detected 2494.138 MHz processor May 10 00:48:25.083435 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:48:25.083448 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:48:25.083461 kernel: last_pfn = 0x7ffdb max_arch_pfn = 0x400000000 May 10 00:48:25.083474 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:48:25.083492 kernel: ACPI: Early table checksum verification disabled May 10 00:48:25.083505 kernel: ACPI: RSDP 0x00000000000F5950 000014 (v00 BOCHS ) May 10 00:48:25.083518 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:48:25.083531 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:48:25.083543 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:48:25.083556 kernel: ACPI: FACS 0x000000007FFE0000 000040 May 10 00:48:25.083570 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:48:25.083583 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:48:25.083597 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:48:25.083615 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 00:48:25.083629 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] May 10 00:48:25.083643 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] May 10 00:48:25.083656 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] May 10 00:48:25.083670 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] May 10 00:48:25.083683 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] May 10 00:48:25.083693 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] May 10 00:48:25.083704 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] May 10 00:48:25.083752 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:48:25.083764 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:48:25.083775 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 10 00:48:25.083788 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] May 10 00:48:25.083800 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffdafff] -> [mem 0x00000000-0x7ffdafff] May 10 00:48:25.083812 kernel: NODE_DATA(0) allocated [mem 0x7ffd5000-0x7ffdafff] May 10 00:48:25.083830 kernel: Zone ranges: May 10 00:48:25.083842 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:48:25.083855 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffdafff] May 10 00:48:25.083866 kernel: Normal empty May 10 00:48:25.083878 kernel: Movable zone start for each node May 10 00:48:25.083922 kernel: Early memory node ranges May 10 00:48:25.083934 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 10 00:48:25.083946 kernel: node 0: [mem 0x0000000000100000-0x000000007ffdafff] May 10 00:48:25.083975 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffdafff] May 10 00:48:25.083995 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:48:25.084013 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 10 00:48:25.084025 kernel: On node 0, zone DMA32: 37 pages in unavailable ranges May 10 00:48:25.084039 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 00:48:25.084052 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:48:25.084064 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:48:25.084076 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 00:48:25.084089 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:48:25.084102 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:48:25.084120 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:48:25.084134 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:48:25.084146 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:48:25.084157 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 10 00:48:25.084169 kernel: TSC deadline timer available May 10 00:48:25.084180 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:48:25.084193 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices May 10 00:48:25.084204 kernel: Booting paravirtualized kernel on KVM May 10 00:48:25.084216 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:48:25.084233 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:48:25.084246 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:48:25.084259 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:48:25.084272 kernel: pcpu-alloc: [0] 0 1 May 10 00:48:25.084285 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 May 10 00:48:25.084297 kernel: kvm-guest: PV spinlocks disabled, no host support May 10 00:48:25.084309 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515803 May 10 00:48:25.084321 kernel: Policy zone: DMA32 May 10 00:48:25.084336 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:48:25.084355 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:48:25.084367 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 00:48:25.084381 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:48:25.084393 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:48:25.084406 kernel: Memory: 1973276K/2096612K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 123076K reserved, 0K cma-reserved) May 10 00:48:25.084419 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:48:25.084431 kernel: Kernel/User page tables isolation: enabled May 10 00:48:25.084444 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:48:25.084463 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:48:25.084476 kernel: rcu: Hierarchical RCU implementation. May 10 00:48:25.084489 kernel: rcu: RCU event tracing is enabled. May 10 00:48:25.084501 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:48:25.084513 kernel: Rude variant of Tasks RCU enabled. May 10 00:48:25.084525 kernel: Tracing variant of Tasks RCU enabled. May 10 00:48:25.084538 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:48:25.084550 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:48:25.084564 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:48:25.084596 kernel: random: crng init done May 10 00:48:25.084607 kernel: Console: colour VGA+ 80x25 May 10 00:48:25.084619 kernel: printk: console [tty0] enabled May 10 00:48:25.084631 kernel: printk: console [ttyS0] enabled May 10 00:48:25.084644 kernel: ACPI: Core revision 20210730 May 10 00:48:25.084657 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 10 00:48:25.084671 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:48:25.084684 kernel: x2apic enabled May 10 00:48:25.084696 kernel: Switched APIC routing to physical x2apic. May 10 00:48:25.084708 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 00:48:25.084727 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns May 10 00:48:25.084740 kernel: Calibrating delay loop (skipped) preset value.. 4988.27 BogoMIPS (lpj=2494138) May 10 00:48:25.084760 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 10 00:48:25.084773 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 10 00:48:25.084787 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:48:25.084801 kernel: Spectre V2 : Mitigation: Retpolines May 10 00:48:25.084814 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:48:25.084827 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls May 10 00:48:25.084849 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:48:25.084877 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:48:25.084963 kernel: MDS: Mitigation: Clear CPU buffers May 10 00:48:25.084983 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:48:25.084996 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:48:25.085008 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:48:25.085020 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:48:25.085032 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:48:25.085045 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:48:25.085060 kernel: Freeing SMP alternatives memory: 32K May 10 00:48:25.085080 kernel: pid_max: default: 32768 minimum: 301 May 10 00:48:25.085103 kernel: LSM: Security Framework initializing May 10 00:48:25.085116 kernel: SELinux: Initializing. May 10 00:48:25.085129 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:48:25.085141 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) May 10 00:48:25.085154 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x4f, stepping: 0x1) May 10 00:48:25.085166 kernel: Performance Events: unsupported p6 CPU model 79 no PMU driver, software events only. May 10 00:48:25.085184 kernel: signal: max sigframe size: 1776 May 10 00:48:25.085196 kernel: rcu: Hierarchical SRCU implementation. May 10 00:48:25.085209 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:48:25.085222 kernel: smp: Bringing up secondary CPUs ... May 10 00:48:25.085235 kernel: x86: Booting SMP configuration: May 10 00:48:25.085248 kernel: .... node #0, CPUs: #1 May 10 00:48:25.085260 kernel: kvm-clock: cpu 1, msr 28196041, secondary cpu clock May 10 00:48:25.085272 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 May 10 00:48:25.085284 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:48:25.085304 kernel: smpboot: Max logical packages: 1 May 10 00:48:25.085317 kernel: smpboot: Total of 2 processors activated (9976.55 BogoMIPS) May 10 00:48:25.085330 kernel: devtmpfs: initialized May 10 00:48:25.085342 kernel: x86/mm: Memory block size: 128MB May 10 00:48:25.085356 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:48:25.085371 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:48:25.085385 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:48:25.085399 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:48:25.085414 kernel: audit: initializing netlink subsys (disabled) May 10 00:48:25.085435 kernel: audit: type=2000 audit(1746838104.793:1): state=initialized audit_enabled=0 res=1 May 10 00:48:25.085450 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:48:25.085464 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:48:25.085493 kernel: cpuidle: using governor menu May 10 00:48:25.085506 kernel: ACPI: bus type PCI registered May 10 00:48:25.085519 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:48:25.085537 kernel: dca service started, version 1.12.1 May 10 00:48:25.085551 kernel: PCI: Using configuration type 1 for base access May 10 00:48:25.085564 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:48:25.085584 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:48:25.085596 kernel: ACPI: Added _OSI(Module Device) May 10 00:48:25.085608 kernel: ACPI: Added _OSI(Processor Device) May 10 00:48:25.085620 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:48:25.085632 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:48:25.085644 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:48:25.085656 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:48:25.085668 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:48:25.085680 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 00:48:25.085698 kernel: ACPI: Interpreter enabled May 10 00:48:25.085710 kernel: ACPI: PM: (supports S0 S5) May 10 00:48:25.085722 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:48:25.085735 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:48:25.085749 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 10 00:48:25.085762 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:48:25.088148 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:48:25.088314 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:48:25.088366 kernel: acpiphp: Slot [3] registered May 10 00:48:25.088377 kernel: acpiphp: Slot [4] registered May 10 00:48:25.088387 kernel: acpiphp: Slot [5] registered May 10 00:48:25.088413 kernel: acpiphp: Slot [6] registered May 10 00:48:25.088423 kernel: acpiphp: Slot [7] registered May 10 00:48:25.088432 kernel: acpiphp: Slot [8] registered May 10 00:48:25.088442 kernel: acpiphp: Slot [9] registered May 10 00:48:25.088451 kernel: acpiphp: Slot [10] registered May 10 00:48:25.088460 kernel: acpiphp: Slot [11] registered May 10 00:48:25.088475 kernel: acpiphp: Slot [12] registered May 10 00:48:25.088484 kernel: acpiphp: Slot [13] registered May 10 00:48:25.088493 kernel: acpiphp: Slot [14] registered May 10 00:48:25.088503 kernel: acpiphp: Slot [15] registered May 10 00:48:25.088512 kernel: acpiphp: Slot [16] registered May 10 00:48:25.088521 kernel: acpiphp: Slot [17] registered May 10 00:48:25.088530 kernel: acpiphp: Slot [18] registered May 10 00:48:25.088540 kernel: acpiphp: Slot [19] registered May 10 00:48:25.088550 kernel: acpiphp: Slot [20] registered May 10 00:48:25.088571 kernel: acpiphp: Slot [21] registered May 10 00:48:25.088599 kernel: acpiphp: Slot [22] registered May 10 00:48:25.088612 kernel: acpiphp: Slot [23] registered May 10 00:48:25.088624 kernel: acpiphp: Slot [24] registered May 10 00:48:25.088637 kernel: acpiphp: Slot [25] registered May 10 00:48:25.088649 kernel: acpiphp: Slot [26] registered May 10 00:48:25.088661 kernel: acpiphp: Slot [27] registered May 10 00:48:25.088685 kernel: acpiphp: Slot [28] registered May 10 00:48:25.088699 kernel: acpiphp: Slot [29] registered May 10 00:48:25.088712 kernel: acpiphp: Slot [30] registered May 10 00:48:25.088731 kernel: acpiphp: Slot [31] registered May 10 00:48:25.088744 kernel: PCI host bridge to bus 0000:00 May 10 00:48:25.088955 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:48:25.089048 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:48:25.089131 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:48:25.089213 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] May 10 00:48:25.089325 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] May 10 00:48:25.089442 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:48:25.089566 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:48:25.089684 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 10 00:48:25.089820 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 10 00:48:25.094127 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] May 10 00:48:25.094357 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 10 00:48:25.094555 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 10 00:48:25.094707 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 10 00:48:25.094858 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 10 00:48:25.094986 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 May 10 00:48:25.095124 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] May 10 00:48:25.095280 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 10 00:48:25.095400 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 10 00:48:25.095546 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 10 00:48:25.095696 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 10 00:48:25.095808 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 10 00:48:25.095983 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] May 10 00:48:25.096134 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] May 10 00:48:25.096282 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] May 10 00:48:25.096427 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 00:48:25.096757 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 10 00:48:25.098066 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] May 10 00:48:25.098220 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] May 10 00:48:25.098363 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] May 10 00:48:25.098539 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:48:25.098690 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] May 10 00:48:25.098866 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] May 10 00:48:25.100225 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] May 10 00:48:25.100388 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 May 10 00:48:25.100521 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] May 10 00:48:25.100650 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] May 10 00:48:25.100756 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] May 10 00:48:25.100874 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 May 10 00:48:25.103158 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] May 10 00:48:25.103262 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] May 10 00:48:25.103353 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] May 10 00:48:25.103499 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 May 10 00:48:25.103616 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] May 10 00:48:25.103706 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] May 10 00:48:25.103820 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] May 10 00:48:25.103995 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 May 10 00:48:25.104087 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] May 10 00:48:25.104206 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] May 10 00:48:25.104219 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:48:25.104229 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:48:25.104238 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:48:25.104247 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:48:25.104264 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:48:25.104273 kernel: iommu: Default domain type: Translated May 10 00:48:25.104283 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:48:25.104377 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 10 00:48:25.104468 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 00:48:25.104635 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 10 00:48:25.104656 kernel: vgaarb: loaded May 10 00:48:25.104672 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:48:25.104686 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:48:25.104707 kernel: PTP clock support registered May 10 00:48:25.104719 kernel: PCI: Using ACPI for IRQ routing May 10 00:48:25.104732 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:48:25.104744 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 10 00:48:25.104758 kernel: e820: reserve RAM buffer [mem 0x7ffdb000-0x7fffffff] May 10 00:48:25.104770 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 10 00:48:25.104780 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 10 00:48:25.104789 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:48:25.104799 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:48:25.104813 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:48:25.104823 kernel: pnp: PnP ACPI init May 10 00:48:25.104832 kernel: pnp: PnP ACPI: found 4 devices May 10 00:48:25.104842 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:48:25.104857 kernel: NET: Registered PF_INET protocol family May 10 00:48:25.104870 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 00:48:25.104898 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) May 10 00:48:25.104910 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:48:25.104924 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:48:25.104934 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) May 10 00:48:25.104943 kernel: TCP: Hash tables configured (established 16384 bind 16384) May 10 00:48:25.104963 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:48:25.104973 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) May 10 00:48:25.104983 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:48:25.104992 kernel: NET: Registered PF_XDP protocol family May 10 00:48:25.105123 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:48:25.105209 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:48:25.105320 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:48:25.105401 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] May 10 00:48:25.105497 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] May 10 00:48:25.105622 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 10 00:48:25.105724 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:48:25.105826 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 10 00:48:25.105845 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 10 00:48:25.110180 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x740 took 39813 usecs May 10 00:48:25.110243 kernel: PCI: CLS 0 bytes, default 64 May 10 00:48:25.110253 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:48:25.110264 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x23f39838d43, max_idle_ns: 440795267131 ns May 10 00:48:25.110274 kernel: Initialise system trusted keyrings May 10 00:48:25.110284 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 May 10 00:48:25.110296 kernel: Key type asymmetric registered May 10 00:48:25.110310 kernel: Asymmetric key parser 'x509' registered May 10 00:48:25.110322 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:48:25.110335 kernel: io scheduler mq-deadline registered May 10 00:48:25.110353 kernel: io scheduler kyber registered May 10 00:48:25.110366 kernel: io scheduler bfq registered May 10 00:48:25.110382 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:48:25.110403 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 10 00:48:25.110417 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 10 00:48:25.110427 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 10 00:48:25.110436 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:48:25.110445 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:48:25.110454 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:48:25.110467 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:48:25.110476 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:48:25.110486 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:48:25.110676 kernel: rtc_cmos 00:03: RTC can wake from S4 May 10 00:48:25.110794 kernel: rtc_cmos 00:03: registered as rtc0 May 10 00:48:25.110912 kernel: rtc_cmos 00:03: setting system clock to 2025-05-10T00:48:24 UTC (1746838104) May 10 00:48:25.111021 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram May 10 00:48:25.111034 kernel: intel_pstate: CPU model not supported May 10 00:48:25.111056 kernel: NET: Registered PF_INET6 protocol family May 10 00:48:25.111069 kernel: Segment Routing with IPv6 May 10 00:48:25.111082 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:48:25.111096 kernel: NET: Registered PF_PACKET protocol family May 10 00:48:25.111105 kernel: Key type dns_resolver registered May 10 00:48:25.111115 kernel: IPI shorthand broadcast: enabled May 10 00:48:25.111127 kernel: sched_clock: Marking stable (645192941, 83286695)->(841334420, -112854784) May 10 00:48:25.111137 kernel: registered taskstats version 1 May 10 00:48:25.111146 kernel: Loading compiled-in X.509 certificates May 10 00:48:25.111161 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:48:25.111170 kernel: Key type .fscrypt registered May 10 00:48:25.111180 kernel: Key type fscrypt-provisioning registered May 10 00:48:25.111189 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 00:48:25.111201 kernel: ima: Allocated hash algorithm: sha1 May 10 00:48:25.111215 kernel: ima: No architecture policies found May 10 00:48:25.111227 kernel: clk: Disabling unused clocks May 10 00:48:25.111240 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:48:25.111256 kernel: Write protecting the kernel read-only data: 28672k May 10 00:48:25.111270 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:48:25.111283 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:48:25.111296 kernel: Run /init as init process May 10 00:48:25.111310 kernel: with arguments: May 10 00:48:25.111320 kernel: /init May 10 00:48:25.111357 kernel: with environment: May 10 00:48:25.111373 kernel: HOME=/ May 10 00:48:25.111387 kernel: TERM=linux May 10 00:48:25.111400 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:48:25.111421 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:48:25.111434 systemd[1]: Detected virtualization kvm. May 10 00:48:25.111444 systemd[1]: Detected architecture x86-64. May 10 00:48:25.111462 systemd[1]: Running in initrd. May 10 00:48:25.111472 systemd[1]: No hostname configured, using default hostname. May 10 00:48:25.111481 systemd[1]: Hostname set to . May 10 00:48:25.111491 systemd[1]: Initializing machine ID from VM UUID. May 10 00:48:25.111504 systemd[1]: Queued start job for default target initrd.target. May 10 00:48:25.111514 systemd[1]: Started systemd-ask-password-console.path. May 10 00:48:25.111529 systemd[1]: Reached target cryptsetup.target. May 10 00:48:25.111543 systemd[1]: Reached target paths.target. May 10 00:48:25.111557 systemd[1]: Reached target slices.target. May 10 00:48:25.111572 systemd[1]: Reached target swap.target. May 10 00:48:25.111585 systemd[1]: Reached target timers.target. May 10 00:48:25.111604 systemd[1]: Listening on iscsid.socket. May 10 00:48:25.111618 systemd[1]: Listening on iscsiuio.socket. May 10 00:48:25.111632 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:48:25.111646 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:48:25.111660 systemd[1]: Listening on systemd-journald.socket. May 10 00:48:25.111674 systemd[1]: Listening on systemd-networkd.socket. May 10 00:48:25.111684 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:48:25.111694 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:48:25.111704 systemd[1]: Reached target sockets.target. May 10 00:48:25.111717 systemd[1]: Starting kmod-static-nodes.service... May 10 00:48:25.111727 systemd[1]: Finished network-cleanup.service. May 10 00:48:25.111740 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:48:25.111750 systemd[1]: Starting systemd-journald.service... May 10 00:48:25.111760 systemd[1]: Starting systemd-modules-load.service... May 10 00:48:25.111770 systemd[1]: Starting systemd-resolved.service... May 10 00:48:25.111783 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:48:25.111793 systemd[1]: Finished kmod-static-nodes.service. May 10 00:48:25.111802 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:48:25.111823 systemd-journald[184]: Journal started May 10 00:48:25.111948 systemd-journald[184]: Runtime Journal (/run/log/journal/42a3043a1442444599545d04aa2179be) is 4.9M, max 39.5M, 34.5M free. May 10 00:48:25.083457 systemd-modules-load[185]: Inserted module 'overlay' May 10 00:48:25.120336 systemd-resolved[186]: Positive Trust Anchors: May 10 00:48:25.137845 systemd[1]: Started systemd-journald.service. May 10 00:48:25.137982 kernel: audit: type=1130 audit(1746838105.127:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.120351 systemd-resolved[186]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:48:25.120389 systemd-resolved[186]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:48:25.123761 systemd-resolved[186]: Defaulting to hostname 'linux'. May 10 00:48:25.143000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.145165 systemd[1]: Started systemd-resolved.service. May 10 00:48:25.153776 kernel: audit: type=1130 audit(1746838105.143:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.153821 kernel: audit: type=1130 audit(1746838105.149:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.150646 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:48:25.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.154220 systemd[1]: Reached target nss-lookup.target. May 10 00:48:25.158501 kernel: audit: type=1130 audit(1746838105.153:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.165958 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:48:25.159513 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:48:25.161370 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:48:25.176526 kernel: audit: type=1130 audit(1746838105.172:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.176631 kernel: Bridge firewalling registered May 10 00:48:25.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.173071 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:48:25.177333 systemd-modules-load[185]: Inserted module 'br_netfilter' May 10 00:48:25.188930 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:48:25.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.192978 kernel: audit: type=1130 audit(1746838105.188:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.190596 systemd[1]: Starting dracut-cmdline.service... May 10 00:48:25.205698 dracut-cmdline[201]: dracut-dracut-053 May 10 00:48:25.207599 dracut-cmdline[201]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:48:25.210920 kernel: SCSI subsystem initialized May 10 00:48:25.231800 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:48:25.231907 kernel: device-mapper: uevent: version 1.0.3 May 10 00:48:25.231931 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:48:25.235466 systemd-modules-load[185]: Inserted module 'dm_multipath' May 10 00:48:25.236380 systemd[1]: Finished systemd-modules-load.service. May 10 00:48:25.240921 kernel: audit: type=1130 audit(1746838105.236:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.240002 systemd[1]: Starting systemd-sysctl.service... May 10 00:48:25.253418 systemd[1]: Finished systemd-sysctl.service. May 10 00:48:25.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.257935 kernel: audit: type=1130 audit(1746838105.252:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.308917 kernel: Loading iSCSI transport class v2.0-870. May 10 00:48:25.330958 kernel: iscsi: registered transport (tcp) May 10 00:48:25.359949 kernel: iscsi: registered transport (qla4xxx) May 10 00:48:25.360073 kernel: QLogic iSCSI HBA Driver May 10 00:48:25.406922 kernel: audit: type=1130 audit(1746838105.403:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.404085 systemd[1]: Finished dracut-cmdline.service. May 10 00:48:25.405758 systemd[1]: Starting dracut-pre-udev.service... May 10 00:48:25.460956 kernel: raid6: avx2x4 gen() 19921 MB/s May 10 00:48:25.477945 kernel: raid6: avx2x4 xor() 7979 MB/s May 10 00:48:25.494948 kernel: raid6: avx2x2 gen() 21287 MB/s May 10 00:48:25.511947 kernel: raid6: avx2x2 xor() 19776 MB/s May 10 00:48:25.528967 kernel: raid6: avx2x1 gen() 21241 MB/s May 10 00:48:25.545966 kernel: raid6: avx2x1 xor() 14997 MB/s May 10 00:48:25.562958 kernel: raid6: sse2x4 gen() 10889 MB/s May 10 00:48:25.579948 kernel: raid6: sse2x4 xor() 6418 MB/s May 10 00:48:25.596958 kernel: raid6: sse2x2 gen() 11838 MB/s May 10 00:48:25.613944 kernel: raid6: sse2x2 xor() 8540 MB/s May 10 00:48:25.630953 kernel: raid6: sse2x1 gen() 9626 MB/s May 10 00:48:25.648156 kernel: raid6: sse2x1 xor() 5949 MB/s May 10 00:48:25.648254 kernel: raid6: using algorithm avx2x2 gen() 21287 MB/s May 10 00:48:25.648274 kernel: raid6: .... xor() 19776 MB/s, rmw enabled May 10 00:48:25.649269 kernel: raid6: using avx2x2 recovery algorithm May 10 00:48:25.662927 kernel: xor: automatically using best checksumming function avx May 10 00:48:25.797945 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:48:25.815141 systemd[1]: Finished dracut-pre-udev.service. May 10 00:48:25.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.815000 audit: BPF prog-id=7 op=LOAD May 10 00:48:25.815000 audit: BPF prog-id=8 op=LOAD May 10 00:48:25.817134 systemd[1]: Starting systemd-udevd.service... May 10 00:48:25.838521 systemd-udevd[383]: Using default interface naming scheme 'v252'. May 10 00:48:25.847383 systemd[1]: Started systemd-udevd.service. May 10 00:48:25.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.852408 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:48:25.872934 dracut-pre-trigger[394]: rd.md=0: removing MD RAID activation May 10 00:48:25.930053 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:48:25.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:25.932392 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:48:26.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:26.002928 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:48:26.079329 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) May 10 00:48:26.132586 kernel: scsi host0: Virtio SCSI HBA May 10 00:48:26.132901 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:48:26.132922 kernel: GPT:9289727 != 125829119 May 10 00:48:26.132934 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:48:26.132946 kernel: GPT:9289727 != 125829119 May 10 00:48:26.132958 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:48:26.132969 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:48:26.132986 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:48:26.135019 kernel: virtio_blk virtio5: [vdb] 980 512-byte logical blocks (502 kB/490 KiB) May 10 00:48:26.155425 kernel: libata version 3.00 loaded. May 10 00:48:26.155447 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:48:26.155461 kernel: AES CTR mode by8 optimization enabled May 10 00:48:26.161987 kernel: ata_piix 0000:00:01.1: version 2.13 May 10 00:48:26.178512 kernel: scsi host1: ata_piix May 10 00:48:26.178806 kernel: scsi host2: ata_piix May 10 00:48:26.179063 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 May 10 00:48:26.179100 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 May 10 00:48:26.199932 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (440) May 10 00:48:26.205167 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:48:26.270750 kernel: ACPI: bus type USB registered May 10 00:48:26.270805 kernel: usbcore: registered new interface driver usbfs May 10 00:48:26.270827 kernel: usbcore: registered new interface driver hub May 10 00:48:26.270846 kernel: usbcore: registered new device driver usb May 10 00:48:26.271025 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:48:26.275564 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:48:26.285508 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:48:26.290107 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:48:26.294003 systemd[1]: Starting disk-uuid.service... May 10 00:48:26.303358 disk-uuid[503]: Primary Header is updated. May 10 00:48:26.303358 disk-uuid[503]: Secondary Entries is updated. May 10 00:48:26.303358 disk-uuid[503]: Secondary Header is updated. May 10 00:48:26.311977 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:48:26.317934 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:48:26.360923 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver May 10 00:48:26.364920 kernel: ehci-pci: EHCI PCI platform driver May 10 00:48:26.398939 kernel: uhci_hcd: USB Universal Host Controller Interface driver May 10 00:48:26.431212 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller May 10 00:48:26.435955 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 May 10 00:48:26.436166 kernel: uhci_hcd 0000:00:01.2: detected 2 ports May 10 00:48:26.436316 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 May 10 00:48:26.436522 kernel: hub 1-0:1.0: USB hub found May 10 00:48:26.436750 kernel: hub 1-0:1.0: 2 ports detected May 10 00:48:27.325302 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 00:48:27.326140 disk-uuid[504]: The operation has completed successfully. May 10 00:48:27.392861 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:48:27.393822 systemd[1]: Finished disk-uuid.service. May 10 00:48:27.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.396039 systemd[1]: Starting verity-setup.service... May 10 00:48:27.420928 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:48:27.476789 systemd[1]: Found device dev-mapper-usr.device. May 10 00:48:27.479206 systemd[1]: Mounting sysusr-usr.mount... May 10 00:48:27.480806 systemd[1]: Finished verity-setup.service. May 10 00:48:27.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.574916 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:48:27.575252 systemd[1]: Mounted sysusr-usr.mount. May 10 00:48:27.576706 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:48:27.578871 systemd[1]: Starting ignition-setup.service... May 10 00:48:27.581661 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:48:27.602742 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:48:27.602838 kernel: BTRFS info (device vda6): using free space tree May 10 00:48:27.602859 kernel: BTRFS info (device vda6): has skinny extents May 10 00:48:27.623701 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:48:27.633018 systemd[1]: Finished ignition-setup.service. May 10 00:48:27.632000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.635062 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:48:27.801412 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:48:27.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.802000 audit: BPF prog-id=9 op=LOAD May 10 00:48:27.804841 systemd[1]: Starting systemd-networkd.service... May 10 00:48:27.807642 ignition[601]: Ignition 2.14.0 May 10 00:48:27.807660 ignition[601]: Stage: fetch-offline May 10 00:48:27.807762 ignition[601]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:48:27.807805 ignition[601]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:48:27.813745 ignition[601]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:48:27.814814 ignition[601]: parsed url from cmdline: "" May 10 00:48:27.814828 ignition[601]: no config URL provided May 10 00:48:27.814841 ignition[601]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:48:27.814861 ignition[601]: no config at "/usr/lib/ignition/user.ign" May 10 00:48:27.814870 ignition[601]: failed to fetch config: resource requires networking May 10 00:48:27.817452 ignition[601]: Ignition finished successfully May 10 00:48:27.819327 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:48:27.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.847839 systemd-networkd[688]: lo: Link UP May 10 00:48:27.847858 systemd-networkd[688]: lo: Gained carrier May 10 00:48:27.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.848796 systemd-networkd[688]: Enumeration completed May 10 00:48:27.848966 systemd[1]: Started systemd-networkd.service. May 10 00:48:27.849631 systemd[1]: Reached target network.target. May 10 00:48:27.851793 systemd[1]: Starting ignition-fetch.service... May 10 00:48:27.852098 systemd-networkd[688]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:48:27.853510 systemd-networkd[688]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. May 10 00:48:27.854381 systemd[1]: Starting iscsiuio.service... May 10 00:48:27.854456 systemd-networkd[688]: eth1: Link UP May 10 00:48:27.854461 systemd-networkd[688]: eth1: Gained carrier May 10 00:48:27.865258 systemd-networkd[688]: eth0: Link UP May 10 00:48:27.865262 systemd-networkd[688]: eth0: Gained carrier May 10 00:48:27.873160 ignition[690]: Ignition 2.14.0 May 10 00:48:27.875589 ignition[690]: Stage: fetch May 10 00:48:27.876393 ignition[690]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:48:27.877181 ignition[690]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:48:27.880223 ignition[690]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:48:27.881042 ignition[690]: parsed url from cmdline: "" May 10 00:48:27.881123 ignition[690]: no config URL provided May 10 00:48:27.881499 ignition[690]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:48:27.882046 ignition[690]: no config at "/usr/lib/ignition/user.ign" May 10 00:48:27.882513 ignition[690]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 May 10 00:48:27.884027 systemd-networkd[688]: eth1: DHCPv4 address 10.124.0.33/20 acquired from 169.254.169.253 May 10 00:48:27.885794 systemd[1]: Started iscsiuio.service. May 10 00:48:27.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.888171 systemd[1]: Starting iscsid.service... May 10 00:48:27.889068 systemd-networkd[688]: eth0: DHCPv4 address 137.184.1.116/20, gateway 137.184.0.1 acquired from 169.254.169.253 May 10 00:48:27.895618 iscsid[698]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:48:27.895618 iscsid[698]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 10 00:48:27.895618 iscsid[698]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:48:27.895618 iscsid[698]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:48:27.895618 iscsid[698]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:48:27.895618 iscsid[698]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:48:27.895618 iscsid[698]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:48:27.897000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.897670 systemd[1]: Started iscsid.service. May 10 00:48:27.899202 systemd[1]: Starting dracut-initqueue.service... May 10 00:48:27.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.918504 systemd[1]: Finished dracut-initqueue.service. May 10 00:48:27.921583 ignition[690]: GET result: OK May 10 00:48:27.919216 systemd[1]: Reached target remote-fs-pre.target. May 10 00:48:27.921688 ignition[690]: parsing config with SHA512: 91938474df35f095ed93ca64bd9badae24986dd9887842bde28d7ca59c81e4ce64eeec3a162e187e9d9f8b5c2988e3c588eb33b0dc43d1b88c88a4c1ef546d6b May 10 00:48:27.919645 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:48:27.920009 systemd[1]: Reached target remote-fs.target. May 10 00:48:27.921425 systemd[1]: Starting dracut-pre-mount.service... May 10 00:48:27.936284 unknown[690]: fetched base config from "system" May 10 00:48:27.936306 unknown[690]: fetched base config from "system" May 10 00:48:27.937004 ignition[690]: fetch: fetch complete May 10 00:48:27.936319 unknown[690]: fetched user config from "digitalocean" May 10 00:48:27.937012 ignition[690]: fetch: fetch passed May 10 00:48:27.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.938639 systemd[1]: Finished ignition-fetch.service. May 10 00:48:27.937080 ignition[690]: Ignition finished successfully May 10 00:48:27.940860 systemd[1]: Starting ignition-kargs.service... May 10 00:48:27.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.946451 systemd[1]: Finished dracut-pre-mount.service. May 10 00:48:27.954767 ignition[710]: Ignition 2.14.0 May 10 00:48:27.954783 ignition[710]: Stage: kargs May 10 00:48:27.954982 ignition[710]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:48:27.955004 ignition[710]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:48:27.957230 ignition[710]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:48:27.958677 ignition[710]: kargs: kargs passed May 10 00:48:27.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.960146 systemd[1]: Finished ignition-kargs.service. May 10 00:48:27.958738 ignition[710]: Ignition finished successfully May 10 00:48:27.962308 systemd[1]: Starting ignition-disks.service... May 10 00:48:27.975798 ignition[718]: Ignition 2.14.0 May 10 00:48:27.975815 ignition[718]: Stage: disks May 10 00:48:27.976053 ignition[718]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:48:27.976083 ignition[718]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:48:27.979084 ignition[718]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:48:27.980863 ignition[718]: disks: disks passed May 10 00:48:27.981001 ignition[718]: Ignition finished successfully May 10 00:48:27.982438 systemd[1]: Finished ignition-disks.service. May 10 00:48:27.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:27.983482 systemd[1]: Reached target initrd-root-device.target. May 10 00:48:27.984080 systemd[1]: Reached target local-fs-pre.target. May 10 00:48:27.984932 systemd[1]: Reached target local-fs.target. May 10 00:48:27.985700 systemd[1]: Reached target sysinit.target. May 10 00:48:27.986454 systemd[1]: Reached target basic.target. May 10 00:48:27.988842 systemd[1]: Starting systemd-fsck-root.service... May 10 00:48:28.012128 systemd-fsck[726]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 10 00:48:28.016848 systemd[1]: Finished systemd-fsck-root.service. May 10 00:48:28.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:28.018269 systemd[1]: Mounting sysroot.mount... May 10 00:48:28.029937 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:48:28.030790 systemd[1]: Mounted sysroot.mount. May 10 00:48:28.031310 systemd[1]: Reached target initrd-root-fs.target. May 10 00:48:28.033843 systemd[1]: Mounting sysroot-usr.mount... May 10 00:48:28.035691 systemd[1]: Starting flatcar-digitalocean-network.service... May 10 00:48:28.041401 systemd[1]: Starting flatcar-metadata-hostname.service... May 10 00:48:28.045337 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:48:28.045396 systemd[1]: Reached target ignition-diskful.target. May 10 00:48:28.050238 systemd[1]: Mounted sysroot-usr.mount. May 10 00:48:28.052397 systemd[1]: Starting initrd-setup-root.service... May 10 00:48:28.064879 initrd-setup-root[738]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:48:28.076250 initrd-setup-root[746]: cut: /sysroot/etc/group: No such file or directory May 10 00:48:28.091822 initrd-setup-root[756]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:48:28.102342 initrd-setup-root[766]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:48:28.172998 coreos-metadata[732]: May 10 00:48:28.172 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:48:28.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:28.182086 systemd[1]: Finished initrd-setup-root.service. May 10 00:48:28.183516 systemd[1]: Starting ignition-mount.service... May 10 00:48:28.185866 coreos-metadata[732]: May 10 00:48:28.185 INFO Fetch successful May 10 00:48:28.186569 systemd[1]: Starting sysroot-boot.service... May 10 00:48:28.198851 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. May 10 00:48:28.199985 coreos-metadata[733]: May 10 00:48:28.199 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:48:28.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:28.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:28.199794 systemd[1]: Finished flatcar-digitalocean-network.service. May 10 00:48:28.206843 bash[784]: umount: /sysroot/usr/share/oem: not mounted. May 10 00:48:28.213004 coreos-metadata[733]: May 10 00:48:28.212 INFO Fetch successful May 10 00:48:28.217678 coreos-metadata[733]: May 10 00:48:28.217 INFO wrote hostname ci-3510.3.7-n-7542157996 to /sysroot/etc/hostname May 10 00:48:28.221441 systemd[1]: Finished flatcar-metadata-hostname.service. May 10 00:48:28.221000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:28.225259 ignition[786]: INFO : Ignition 2.14.0 May 10 00:48:28.225259 ignition[786]: INFO : Stage: mount May 10 00:48:28.226345 ignition[786]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:48:28.226345 ignition[786]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:48:28.227924 ignition[786]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:48:28.229439 ignition[786]: INFO : mount: mount passed May 10 00:48:28.230007 ignition[786]: INFO : Ignition finished successfully May 10 00:48:28.230000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:28.230660 systemd[1]: Finished ignition-mount.service. May 10 00:48:28.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:28.243593 systemd[1]: Finished sysroot-boot.service. May 10 00:48:28.498261 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:48:28.509924 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (793) May 10 00:48:28.512047 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:48:28.512113 kernel: BTRFS info (device vda6): using free space tree May 10 00:48:28.512136 kernel: BTRFS info (device vda6): has skinny extents May 10 00:48:28.518166 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:48:28.528102 systemd[1]: Starting ignition-files.service... May 10 00:48:28.553533 ignition[813]: INFO : Ignition 2.14.0 May 10 00:48:28.553533 ignition[813]: INFO : Stage: files May 10 00:48:28.554669 ignition[813]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:48:28.554669 ignition[813]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:48:28.556516 ignition[813]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:48:28.562412 ignition[813]: DEBUG : files: compiled without relabeling support, skipping May 10 00:48:28.563555 ignition[813]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:48:28.563555 ignition[813]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:48:28.567265 ignition[813]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:48:28.568130 ignition[813]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:48:28.569981 unknown[813]: wrote ssh authorized keys file for user: core May 10 00:48:28.572386 ignition[813]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:48:28.572386 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:48:28.572386 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:48:28.636001 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 00:48:28.762078 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:48:28.763164 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 00:48:28.763989 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:48:28.763989 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:48:28.763989 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:48:28.763989 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:48:28.763989 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:48:28.763989 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:48:28.763989 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:48:28.769829 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:48:28.769829 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:48:28.769829 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:48:28.769829 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:48:28.769829 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:48:28.769829 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 10 00:48:28.928476 systemd-networkd[688]: eth1: Gained IPv6LL May 10 00:48:29.312300 systemd-networkd[688]: eth0: Gained IPv6LL May 10 00:48:29.320356 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 00:48:29.722120 ignition[813]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 10 00:48:29.722120 ignition[813]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:48:29.722120 ignition[813]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:48:29.722120 ignition[813]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 10 00:48:29.725385 ignition[813]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:48:29.725385 ignition[813]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:48:29.725385 ignition[813]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 10 00:48:29.725385 ignition[813]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:48:29.725385 ignition[813]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:48:29.725385 ignition[813]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 10 00:48:29.725385 ignition[813]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:48:29.737363 ignition[813]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:48:29.739905 ignition[813]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:48:29.739905 ignition[813]: INFO : files: files passed May 10 00:48:29.739905 ignition[813]: INFO : Ignition finished successfully May 10 00:48:29.747465 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 00:48:29.747529 kernel: audit: type=1130 audit(1746838109.741:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.741146 systemd[1]: Finished ignition-files.service. May 10 00:48:29.745323 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:48:29.752008 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:48:29.756484 systemd[1]: Starting ignition-quench.service... May 10 00:48:29.761503 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:48:29.762713 systemd[1]: Finished ignition-quench.service. May 10 00:48:29.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.766261 initrd-setup-root-after-ignition[838]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:48:29.773050 kernel: audit: type=1130 audit(1746838109.763:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.773128 kernel: audit: type=1131 audit(1746838109.763:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.772065 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:48:29.778228 kernel: audit: type=1130 audit(1746838109.772:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.772000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.773876 systemd[1]: Reached target ignition-complete.target. May 10 00:48:29.780113 systemd[1]: Starting initrd-parse-etc.service... May 10 00:48:29.807685 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:48:29.807859 systemd[1]: Finished initrd-parse-etc.service. May 10 00:48:29.815584 kernel: audit: type=1130 audit(1746838109.808:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.815632 kernel: audit: type=1131 audit(1746838109.808:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.809360 systemd[1]: Reached target initrd-fs.target. May 10 00:48:29.815954 systemd[1]: Reached target initrd.target. May 10 00:48:29.817004 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:48:29.818823 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:48:29.840418 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:48:29.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.843899 kernel: audit: type=1130 audit(1746838109.840:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.842657 systemd[1]: Starting initrd-cleanup.service... May 10 00:48:29.860842 systemd[1]: Stopped target nss-lookup.target. May 10 00:48:29.862355 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:48:29.863755 systemd[1]: Stopped target timers.target. May 10 00:48:29.865219 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:48:29.866112 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:48:29.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.870728 systemd[1]: Stopped target initrd.target. May 10 00:48:29.871752 kernel: audit: type=1131 audit(1746838109.866:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.871499 systemd[1]: Stopped target basic.target. May 10 00:48:29.872262 systemd[1]: Stopped target ignition-complete.target. May 10 00:48:29.873256 systemd[1]: Stopped target ignition-diskful.target. May 10 00:48:29.873865 systemd[1]: Stopped target initrd-root-device.target. May 10 00:48:29.874498 systemd[1]: Stopped target remote-fs.target. May 10 00:48:29.875044 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:48:29.885046 systemd[1]: Stopped target sysinit.target. May 10 00:48:29.892036 kernel: audit: type=1131 audit(1746838109.888:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.885971 systemd[1]: Stopped target local-fs.target. May 10 00:48:29.886721 systemd[1]: Stopped target local-fs-pre.target. May 10 00:48:29.887479 systemd[1]: Stopped target swap.target. May 10 00:48:29.893000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.888120 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:48:29.897468 kernel: audit: type=1131 audit(1746838109.893:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.888380 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:48:29.889505 systemd[1]: Stopped target cryptsetup.target. May 10 00:48:29.892656 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:48:29.897000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.893017 systemd[1]: Stopped dracut-initqueue.service. May 10 00:48:29.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.894254 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:48:29.894541 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:48:29.898088 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:48:29.898254 systemd[1]: Stopped ignition-files.service. May 10 00:48:29.899523 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. May 10 00:48:29.899758 systemd[1]: Stopped flatcar-metadata-hostname.service. May 10 00:48:29.904988 iscsid[698]: iscsid shutting down. May 10 00:48:29.902458 systemd[1]: Stopping ignition-mount.service... May 10 00:48:29.908487 systemd[1]: Stopping iscsid.service... May 10 00:48:29.912000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.911999 systemd[1]: Stopping sysroot-boot.service... May 10 00:48:29.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.912543 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:48:29.912830 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:48:29.913754 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:48:29.913973 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:48:29.917314 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:48:29.917546 systemd[1]: Stopped iscsid.service. May 10 00:48:29.919349 systemd[1]: Stopping iscsiuio.service... May 10 00:48:29.931576 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:48:29.932000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.933009 systemd[1]: Stopped iscsiuio.service. May 10 00:48:29.934124 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:48:29.934301 systemd[1]: Finished initrd-cleanup.service. May 10 00:48:29.940915 ignition[851]: INFO : Ignition 2.14.0 May 10 00:48:29.948301 ignition[851]: INFO : Stage: umount May 10 00:48:29.948301 ignition[851]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:48:29.948301 ignition[851]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c May 10 00:48:29.952870 ignition[851]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" May 10 00:48:29.955445 ignition[851]: INFO : umount: umount passed May 10 00:48:29.956237 ignition[851]: INFO : Ignition finished successfully May 10 00:48:29.957553 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:48:29.959135 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:48:29.959253 systemd[1]: Stopped ignition-mount.service. May 10 00:48:29.959000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.960394 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:48:29.961000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.960472 systemd[1]: Stopped ignition-disks.service. May 10 00:48:29.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.963000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.964000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.962071 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:48:29.962143 systemd[1]: Stopped ignition-kargs.service. May 10 00:48:29.964258 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:48:29.964329 systemd[1]: Stopped ignition-fetch.service. May 10 00:48:29.964802 systemd[1]: Stopped target network.target. May 10 00:48:29.965190 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:48:29.965267 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:48:29.965637 systemd[1]: Stopped target paths.target. May 10 00:48:29.965972 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:48:29.970003 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:48:29.970680 systemd[1]: Stopped target slices.target. May 10 00:48:29.971362 systemd[1]: Stopped target sockets.target. May 10 00:48:29.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.971996 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:48:29.972063 systemd[1]: Closed iscsid.socket. May 10 00:48:29.972754 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:48:29.972810 systemd[1]: Closed iscsiuio.socket. May 10 00:48:29.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.973347 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:48:29.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.973403 systemd[1]: Stopped ignition-setup.service. May 10 00:48:29.974172 systemd[1]: Stopping systemd-networkd.service... May 10 00:48:29.975053 systemd[1]: Stopping systemd-resolved.service... May 10 00:48:29.976067 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:48:29.976194 systemd[1]: Stopped sysroot-boot.service. May 10 00:48:29.977254 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:48:29.977319 systemd[1]: Stopped initrd-setup-root.service. May 10 00:48:29.979012 systemd-networkd[688]: eth0: DHCPv6 lease lost May 10 00:48:29.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.982430 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:48:29.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.982572 systemd[1]: Stopped systemd-resolved.service. May 10 00:48:29.986000 audit: BPF prog-id=6 op=UNLOAD May 10 00:48:29.982857 systemd-networkd[688]: eth1: DHCPv6 lease lost May 10 00:48:29.984970 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:48:29.985217 systemd[1]: Stopped systemd-networkd.service. May 10 00:48:29.988000 audit: BPF prog-id=9 op=UNLOAD May 10 00:48:29.987159 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:48:29.987218 systemd[1]: Closed systemd-networkd.socket. May 10 00:48:29.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.989365 systemd[1]: Stopping network-cleanup.service... May 10 00:48:29.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.989748 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:48:29.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:29.989843 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:48:29.990579 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:48:29.990633 systemd[1]: Stopped systemd-sysctl.service. May 10 00:48:29.991292 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:48:29.991336 systemd[1]: Stopped systemd-modules-load.service. May 10 00:48:29.996143 systemd[1]: Stopping systemd-udevd.service... May 10 00:48:30.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.000339 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:48:30.002553 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:48:30.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.002818 systemd[1]: Stopped systemd-udevd.service. May 10 00:48:30.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.004370 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:48:30.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.004445 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:48:30.005238 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:48:30.005282 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:48:30.006999 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:48:30.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.007148 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:48:30.013000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.007847 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:48:30.014000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.007983 systemd[1]: Stopped dracut-cmdline.service. May 10 00:48:30.008757 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:48:30.008837 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:48:30.011105 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:48:30.012078 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. May 10 00:48:30.012200 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. May 10 00:48:30.013386 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:48:30.013482 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:48:30.014184 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:48:30.014248 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:48:30.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.017562 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. May 10 00:48:30.018760 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:48:30.029095 systemd[1]: Stopped network-cleanup.service. May 10 00:48:30.033470 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:48:30.033658 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:48:30.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.034000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:30.035290 systemd[1]: Reached target initrd-switch-root.target. May 10 00:48:30.037765 systemd[1]: Starting initrd-switch-root.service... May 10 00:48:30.058277 systemd[1]: Switching root. May 10 00:48:30.086076 systemd-journald[184]: Journal stopped May 10 00:48:33.943203 systemd-journald[184]: Received SIGTERM from PID 1 (systemd). May 10 00:48:33.943309 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:48:33.943340 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:48:33.943358 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:48:33.943376 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:48:33.943409 kernel: SELinux: policy capability open_perms=1 May 10 00:48:33.943434 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:48:33.943452 kernel: SELinux: policy capability always_check_network=0 May 10 00:48:33.943475 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:48:33.943496 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:48:33.943513 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:48:33.943531 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:48:33.943550 systemd[1]: Successfully loaded SELinux policy in 51.940ms. May 10 00:48:33.943585 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 13.260ms. May 10 00:48:33.943606 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:48:33.943625 systemd[1]: Detected virtualization kvm. May 10 00:48:33.943644 systemd[1]: Detected architecture x86-64. May 10 00:48:33.943666 systemd[1]: Detected first boot. May 10 00:48:33.943685 systemd[1]: Hostname set to . May 10 00:48:33.943704 systemd[1]: Initializing machine ID from VM UUID. May 10 00:48:33.943724 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:48:33.943742 systemd[1]: Populated /etc with preset unit settings. May 10 00:48:33.943763 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:48:33.943783 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:48:33.943807 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:48:33.943828 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:48:33.943848 systemd[1]: Stopped initrd-switch-root.service. May 10 00:48:33.943867 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:48:33.943897 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:48:33.943914 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:48:33.943932 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:48:33.943953 systemd[1]: Created slice system-getty.slice. May 10 00:48:33.943976 systemd[1]: Created slice system-modprobe.slice. May 10 00:48:33.943995 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:48:33.944014 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:48:33.944033 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:48:33.944052 systemd[1]: Created slice user.slice. May 10 00:48:33.944074 systemd[1]: Started systemd-ask-password-console.path. May 10 00:48:33.944092 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:48:33.944110 systemd[1]: Set up automount boot.automount. May 10 00:48:33.944135 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:48:33.944155 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:48:33.944174 systemd[1]: Stopped target initrd-fs.target. May 10 00:48:33.944194 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:48:33.944213 systemd[1]: Reached target integritysetup.target. May 10 00:48:33.944233 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:48:33.944253 systemd[1]: Reached target remote-fs.target. May 10 00:48:33.944272 systemd[1]: Reached target slices.target. May 10 00:48:33.944296 systemd[1]: Reached target swap.target. May 10 00:48:33.944316 systemd[1]: Reached target torcx.target. May 10 00:48:33.944336 systemd[1]: Reached target veritysetup.target. May 10 00:48:33.944354 systemd[1]: Listening on systemd-coredump.socket. May 10 00:48:33.944373 systemd[1]: Listening on systemd-initctl.socket. May 10 00:48:33.944391 systemd[1]: Listening on systemd-networkd.socket. May 10 00:48:33.944412 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:48:33.944429 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:48:33.944461 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:48:33.944493 systemd[1]: Mounting dev-hugepages.mount... May 10 00:48:33.944509 systemd[1]: Mounting dev-mqueue.mount... May 10 00:48:33.944527 systemd[1]: Mounting media.mount... May 10 00:48:33.944546 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:48:33.944565 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:48:33.944585 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:48:33.944603 systemd[1]: Mounting tmp.mount... May 10 00:48:33.944622 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:48:33.944641 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:48:33.944665 systemd[1]: Starting kmod-static-nodes.service... May 10 00:48:33.944684 systemd[1]: Starting modprobe@configfs.service... May 10 00:48:33.944703 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:48:33.944724 systemd[1]: Starting modprobe@drm.service... May 10 00:48:33.944744 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:48:33.944763 systemd[1]: Starting modprobe@fuse.service... May 10 00:48:33.944781 systemd[1]: Starting modprobe@loop.service... May 10 00:48:33.944802 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:48:33.944822 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:48:33.944846 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:48:33.944866 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:48:33.944899 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:48:33.944916 systemd[1]: Stopped systemd-journald.service. May 10 00:48:33.944934 systemd[1]: Starting systemd-journald.service... May 10 00:48:33.944952 systemd[1]: Starting systemd-modules-load.service... May 10 00:48:33.944972 systemd[1]: Starting systemd-network-generator.service... May 10 00:48:33.944989 systemd[1]: Starting systemd-remount-fs.service... May 10 00:48:33.945005 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:48:33.945027 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:48:33.945045 systemd[1]: Stopped verity-setup.service. May 10 00:48:33.945061 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:48:33.945078 systemd[1]: Mounted dev-hugepages.mount. May 10 00:48:33.945096 kernel: loop: module loaded May 10 00:48:33.945117 systemd[1]: Mounted dev-mqueue.mount. May 10 00:48:33.945135 systemd[1]: Mounted media.mount. May 10 00:48:33.945153 kernel: fuse: init (API version 7.34) May 10 00:48:33.945171 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:48:33.945194 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:48:33.945213 systemd[1]: Mounted tmp.mount. May 10 00:48:33.945232 systemd[1]: Finished kmod-static-nodes.service. May 10 00:48:33.945251 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:48:33.945270 systemd[1]: Finished modprobe@configfs.service. May 10 00:48:33.945289 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:48:33.945307 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:48:33.945325 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:48:33.945350 systemd[1]: Finished modprobe@drm.service. May 10 00:48:33.945370 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:48:33.945388 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:48:33.945406 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:48:33.945423 systemd[1]: Finished modprobe@fuse.service. May 10 00:48:33.945439 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:48:33.945461 systemd[1]: Finished modprobe@loop.service. May 10 00:48:33.945481 systemd[1]: Finished systemd-modules-load.service. May 10 00:48:33.945500 systemd[1]: Finished systemd-network-generator.service. May 10 00:48:33.945519 systemd[1]: Finished systemd-remount-fs.service. May 10 00:48:33.945537 systemd[1]: Reached target network-pre.target. May 10 00:48:33.945555 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:48:33.945583 systemd-journald[958]: Journal started May 10 00:48:33.945670 systemd-journald[958]: Runtime Journal (/run/log/journal/42a3043a1442444599545d04aa2179be) is 4.9M, max 39.5M, 34.5M free. May 10 00:48:30.262000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:48:30.329000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:48:33.952773 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:48:33.952845 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:48:30.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:48:30.330000 audit: BPF prog-id=10 op=LOAD May 10 00:48:30.330000 audit: BPF prog-id=10 op=UNLOAD May 10 00:48:30.330000 audit: BPF prog-id=11 op=LOAD May 10 00:48:30.330000 audit: BPF prog-id=11 op=UNLOAD May 10 00:48:30.460000 audit[884]: AVC avc: denied { associate } for pid=884 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:48:30.460000 audit[884]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d892 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=867 pid=884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:30.460000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:48:30.462000 audit[884]: AVC avc: denied { associate } for pid=884 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:48:30.462000 audit[884]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d969 a2=1ed a3=0 items=2 ppid=867 pid=884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:30.462000 audit: CWD cwd="/" May 10 00:48:30.462000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:30.462000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:30.462000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:48:33.713000 audit: BPF prog-id=12 op=LOAD May 10 00:48:33.713000 audit: BPF prog-id=3 op=UNLOAD May 10 00:48:33.713000 audit: BPF prog-id=13 op=LOAD May 10 00:48:33.713000 audit: BPF prog-id=14 op=LOAD May 10 00:48:33.713000 audit: BPF prog-id=4 op=UNLOAD May 10 00:48:33.713000 audit: BPF prog-id=5 op=UNLOAD May 10 00:48:33.714000 audit: BPF prog-id=15 op=LOAD May 10 00:48:33.714000 audit: BPF prog-id=12 op=UNLOAD May 10 00:48:33.714000 audit: BPF prog-id=16 op=LOAD May 10 00:48:33.714000 audit: BPF prog-id=17 op=LOAD May 10 00:48:33.714000 audit: BPF prog-id=13 op=UNLOAD May 10 00:48:33.714000 audit: BPF prog-id=14 op=UNLOAD May 10 00:48:33.715000 audit: BPF prog-id=18 op=LOAD May 10 00:48:33.715000 audit: BPF prog-id=15 op=UNLOAD May 10 00:48:33.716000 audit: BPF prog-id=19 op=LOAD May 10 00:48:33.716000 audit: BPF prog-id=20 op=LOAD May 10 00:48:33.716000 audit: BPF prog-id=16 op=UNLOAD May 10 00:48:33.716000 audit: BPF prog-id=17 op=UNLOAD May 10 00:48:33.716000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.723000 audit: BPF prog-id=18 op=UNLOAD May 10 00:48:33.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.826000 audit: BPF prog-id=21 op=LOAD May 10 00:48:33.827000 audit: BPF prog-id=22 op=LOAD May 10 00:48:33.827000 audit: BPF prog-id=23 op=LOAD May 10 00:48:33.827000 audit: BPF prog-id=19 op=UNLOAD May 10 00:48:33.827000 audit: BPF prog-id=20 op=UNLOAD May 10 00:48:33.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.899000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.910000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.917000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.921000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.940000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:48:33.940000 audit[958]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffeb810d2b0 a2=4000 a3=7ffeb810d34c items=0 ppid=1 pid=958 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:33.940000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:48:33.712233 systemd[1]: Queued start job for default target multi-user.target. May 10 00:48:33.963605 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:48:33.963651 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:48:30.456545 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:48:33.712250 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 00:48:30.457207 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:48:33.717427 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:48:30.457244 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:48:30.457301 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:48:30.457319 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:48:30.457383 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:48:30.457406 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:48:30.457774 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:48:30.457859 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:48:30.457887 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:48:30.459696 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:48:30.459763 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:48:30.459798 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:48:30.459821 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:48:30.459852 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:48:30.459873 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:30Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:48:33.298375 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:33Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:48:33.298921 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:33Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:48:33.299067 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:33Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:48:33.299345 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:33Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:48:33.299410 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:33Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:48:33.299487 /usr/lib/systemd/system-generators/torcx-generator[884]: time="2025-05-10T00:48:33Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:48:33.980409 systemd[1]: Starting systemd-random-seed.service... May 10 00:48:33.980517 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:48:33.980547 systemd[1]: Starting systemd-sysctl.service... May 10 00:48:33.984392 systemd[1]: Started systemd-journald.service. May 10 00:48:33.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.988039 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:48:33.988798 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:48:33.990100 systemd[1]: Finished systemd-random-seed.service. May 10 00:48:33.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:33.993630 systemd[1]: Reached target first-boot-complete.target. May 10 00:48:33.996373 systemd[1]: Starting systemd-journal-flush.service... May 10 00:48:34.005240 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:48:34.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.007845 systemd[1]: Starting systemd-sysusers.service... May 10 00:48:34.010565 systemd-journald[958]: Time spent on flushing to /var/log/journal/42a3043a1442444599545d04aa2179be is 97.823ms for 1161 entries. May 10 00:48:34.010565 systemd-journald[958]: System Journal (/var/log/journal/42a3043a1442444599545d04aa2179be) is 8.0M, max 195.6M, 187.6M free. May 10 00:48:34.121172 systemd-journald[958]: Received client request to flush runtime journal. May 10 00:48:34.034000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.035146 systemd[1]: Finished systemd-sysctl.service. May 10 00:48:34.047458 systemd[1]: Finished systemd-sysusers.service. May 10 00:48:34.050124 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:48:34.100239 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:48:34.104683 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:48:34.107121 systemd[1]: Starting systemd-udev-settle.service... May 10 00:48:34.122437 systemd[1]: Finished systemd-journal-flush.service. May 10 00:48:34.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.123790 udevadm[995]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:48:34.709640 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:48:34.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.709000 audit: BPF prog-id=24 op=LOAD May 10 00:48:34.709000 audit: BPF prog-id=25 op=LOAD May 10 00:48:34.709000 audit: BPF prog-id=7 op=UNLOAD May 10 00:48:34.709000 audit: BPF prog-id=8 op=UNLOAD May 10 00:48:34.711532 systemd[1]: Starting systemd-udevd.service... May 10 00:48:34.733108 systemd-udevd[997]: Using default interface naming scheme 'v252'. May 10 00:48:34.771157 kernel: kauditd_printk_skb: 114 callbacks suppressed May 10 00:48:34.771314 kernel: audit: type=1130 audit(1746838114.763:154): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.771343 kernel: audit: type=1334 audit(1746838114.769:155): prog-id=26 op=LOAD May 10 00:48:34.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.769000 audit: BPF prog-id=26 op=LOAD May 10 00:48:34.764297 systemd[1]: Started systemd-udevd.service. May 10 00:48:34.771849 systemd[1]: Starting systemd-networkd.service... May 10 00:48:34.784519 kernel: audit: type=1334 audit(1746838114.779:156): prog-id=27 op=LOAD May 10 00:48:34.784635 kernel: audit: type=1334 audit(1746838114.781:157): prog-id=28 op=LOAD May 10 00:48:34.784658 kernel: audit: type=1334 audit(1746838114.782:158): prog-id=29 op=LOAD May 10 00:48:34.779000 audit: BPF prog-id=27 op=LOAD May 10 00:48:34.781000 audit: BPF prog-id=28 op=LOAD May 10 00:48:34.782000 audit: BPF prog-id=29 op=LOAD May 10 00:48:34.784006 systemd[1]: Starting systemd-userdbd.service... May 10 00:48:34.837306 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:48:34.837528 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:48:34.838866 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:48:34.840701 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:48:34.843201 systemd[1]: Starting modprobe@loop.service... May 10 00:48:34.844845 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:48:34.844972 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:48:34.845102 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:48:34.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.849319 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:48:34.849527 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:48:34.850508 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:48:34.850711 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:48:34.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.858540 kernel: audit: type=1130 audit(1746838114.849:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.858661 kernel: audit: type=1131 audit(1746838114.849:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.858685 kernel: audit: type=1130 audit(1746838114.857:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.858206 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:48:34.858360 systemd[1]: Finished modprobe@loop.service. May 10 00:48:34.863147 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:48:34.857000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.863215 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:48:34.863551 systemd[1]: Started systemd-userdbd.service. May 10 00:48:34.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.870874 kernel: audit: type=1131 audit(1746838114.857:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.870990 kernel: audit: type=1130 audit(1746838114.861:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.904573 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:48:34.918360 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:48:34.986056 systemd-networkd[1000]: lo: Link UP May 10 00:48:34.986451 systemd-networkd[1000]: lo: Gained carrier May 10 00:48:34.987097 systemd-networkd[1000]: Enumeration completed May 10 00:48:34.986000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:34.987319 systemd[1]: Started systemd-networkd.service. May 10 00:48:34.988572 systemd-networkd[1000]: eth1: Configuring with /run/systemd/network/10-0e:d4:c1:9b:3f:b9.network. May 10 00:48:34.989836 systemd-networkd[1000]: eth0: Configuring with /run/systemd/network/10-5a:1d:c7:f2:44:f6.network. May 10 00:48:34.990829 systemd-networkd[1000]: eth1: Link UP May 10 00:48:34.990978 systemd-networkd[1000]: eth1: Gained carrier May 10 00:48:34.996957 systemd-networkd[1000]: eth0: Link UP May 10 00:48:34.996968 systemd-networkd[1000]: eth0: Gained carrier May 10 00:48:35.012927 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:48:35.022927 kernel: ACPI: button: Power Button [PWRF] May 10 00:48:35.027000 audit[1011]: AVC avc: denied { confidentiality } for pid=1011 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:48:35.027000 audit[1011]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=562489ea9700 a1=338ac a2=7fca8dd76bc5 a3=5 items=110 ppid=997 pid=1011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:35.027000 audit: CWD cwd="/" May 10 00:48:35.027000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=1 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=2 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=3 name=(null) inode=14587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=4 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=5 name=(null) inode=14588 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=6 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=7 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=8 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=9 name=(null) inode=14590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=10 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=11 name=(null) inode=14591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=12 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=13 name=(null) inode=14592 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=14 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=15 name=(null) inode=14593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=16 name=(null) inode=14589 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=17 name=(null) inode=14594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=18 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=19 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=20 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=21 name=(null) inode=14596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=22 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=23 name=(null) inode=14597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=24 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=25 name=(null) inode=14598 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=26 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=27 name=(null) inode=14599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=28 name=(null) inode=14595 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=29 name=(null) inode=14600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=30 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=31 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=32 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=33 name=(null) inode=14602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=34 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=35 name=(null) inode=14603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=36 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=37 name=(null) inode=14604 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=38 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=39 name=(null) inode=14605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=40 name=(null) inode=14601 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=41 name=(null) inode=14606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=42 name=(null) inode=14586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=43 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=44 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=45 name=(null) inode=14608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=46 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=47 name=(null) inode=14609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=48 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=49 name=(null) inode=14610 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=50 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=51 name=(null) inode=14611 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=52 name=(null) inode=14607 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=53 name=(null) inode=14612 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=55 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=56 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=57 name=(null) inode=14614 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=58 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=59 name=(null) inode=14615 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=60 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=61 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=62 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=63 name=(null) inode=14617 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=64 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=65 name=(null) inode=14618 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=66 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=67 name=(null) inode=14619 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=68 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=69 name=(null) inode=14620 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=70 name=(null) inode=14616 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=71 name=(null) inode=14621 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=72 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=73 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=74 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=75 name=(null) inode=14623 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=76 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=77 name=(null) inode=14624 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=78 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=79 name=(null) inode=14625 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=80 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=81 name=(null) inode=14626 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=82 name=(null) inode=14622 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=83 name=(null) inode=14627 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=84 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=85 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=86 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=87 name=(null) inode=14629 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=88 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=89 name=(null) inode=14630 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=90 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=91 name=(null) inode=14631 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=92 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=93 name=(null) inode=14632 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=94 name=(null) inode=14628 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=95 name=(null) inode=14633 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=96 name=(null) inode=14613 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=97 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=98 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=99 name=(null) inode=14635 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=100 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=101 name=(null) inode=14636 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=102 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=103 name=(null) inode=14637 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=104 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=105 name=(null) inode=14638 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=106 name=(null) inode=14634 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=107 name=(null) inode=14639 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PATH item=109 name=(null) inode=14640 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:48:35.027000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:48:35.075644 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 10 00:48:35.077067 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 00:48:35.099910 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:48:35.238962 kernel: EDAC MC: Ver: 3.0.0 May 10 00:48:35.267647 systemd[1]: Finished systemd-udev-settle.service. May 10 00:48:35.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.269973 systemd[1]: Starting lvm2-activation-early.service... May 10 00:48:35.292227 lvm[1035]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:48:35.326491 systemd[1]: Finished lvm2-activation-early.service. May 10 00:48:35.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.327286 systemd[1]: Reached target cryptsetup.target. May 10 00:48:35.329772 systemd[1]: Starting lvm2-activation.service... May 10 00:48:35.335562 lvm[1036]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:48:35.360381 systemd[1]: Finished lvm2-activation.service. May 10 00:48:35.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.361055 systemd[1]: Reached target local-fs-pre.target. May 10 00:48:35.363099 systemd[1]: Mounting media-configdrive.mount... May 10 00:48:35.363498 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:48:35.363554 systemd[1]: Reached target machines.target. May 10 00:48:35.365840 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:48:35.378265 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:48:35.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.379922 kernel: ISO 9660 Extensions: RRIP_1991A May 10 00:48:35.381582 systemd[1]: Mounted media-configdrive.mount. May 10 00:48:35.382167 systemd[1]: Reached target local-fs.target. May 10 00:48:35.383829 systemd[1]: Starting ldconfig.service... May 10 00:48:35.385000 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:48:35.385097 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:48:35.386865 systemd[1]: Starting systemd-boot-update.service... May 10 00:48:35.389532 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:48:35.393048 systemd[1]: Starting systemd-sysext.service... May 10 00:48:35.406644 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1042 (bootctl) May 10 00:48:35.408310 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:48:35.425528 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:48:35.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.431120 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:48:35.431965 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:48:35.434786 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:48:35.435119 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:48:35.454942 kernel: loop0: detected capacity change from 0 to 205544 May 10 00:48:35.484918 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:48:35.508918 kernel: loop1: detected capacity change from 0 to 205544 May 10 00:48:35.516694 systemd-fsck[1050]: fsck.fat 4.2 (2021-01-31) May 10 00:48:35.516694 systemd-fsck[1050]: /dev/vda1: 790 files, 120688/258078 clusters May 10 00:48:35.525719 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:48:35.525000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.527675 systemd[1]: Mounting boot.mount... May 10 00:48:35.536113 (sd-sysext)[1053]: Using extensions 'kubernetes'. May 10 00:48:35.537862 (sd-sysext)[1053]: Merged extensions into '/usr'. May 10 00:48:35.556635 systemd[1]: Mounted boot.mount. May 10 00:48:35.565741 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:48:35.567674 systemd[1]: Mounting usr-share-oem.mount... May 10 00:48:35.568288 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:48:35.571646 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:48:35.574674 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:48:35.577342 systemd[1]: Starting modprobe@loop.service... May 10 00:48:35.578652 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:48:35.579139 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:48:35.579335 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:48:35.582796 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:48:35.583067 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:48:35.582000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.585089 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:48:35.585613 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:48:35.585751 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:48:35.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.591606 systemd[1]: Mounted usr-share-oem.mount. May 10 00:48:35.593743 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:48:35.593929 systemd[1]: Finished modprobe@loop.service. May 10 00:48:35.594814 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:48:35.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.596877 systemd[1]: Finished systemd-sysext.service. May 10 00:48:35.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.599280 systemd[1]: Starting ensure-sysext.service... May 10 00:48:35.601314 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:48:35.609069 systemd[1]: Reloading. May 10 00:48:35.630732 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:48:35.633720 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:48:35.637923 systemd-tmpfiles[1061]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:48:35.786792 /usr/lib/systemd/system-generators/torcx-generator[1080]: time="2025-05-10T00:48:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:48:35.788358 ldconfig[1041]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:48:35.803114 /usr/lib/systemd/system-generators/torcx-generator[1080]: time="2025-05-10T00:48:35Z" level=info msg="torcx already run" May 10 00:48:35.897828 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:48:35.897853 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:48:35.917570 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:48:35.979000 audit: BPF prog-id=30 op=LOAD May 10 00:48:35.980000 audit: BPF prog-id=31 op=LOAD May 10 00:48:35.980000 audit: BPF prog-id=24 op=UNLOAD May 10 00:48:35.980000 audit: BPF prog-id=25 op=UNLOAD May 10 00:48:35.980000 audit: BPF prog-id=32 op=LOAD May 10 00:48:35.980000 audit: BPF prog-id=27 op=UNLOAD May 10 00:48:35.980000 audit: BPF prog-id=33 op=LOAD May 10 00:48:35.980000 audit: BPF prog-id=34 op=LOAD May 10 00:48:35.980000 audit: BPF prog-id=28 op=UNLOAD May 10 00:48:35.980000 audit: BPF prog-id=29 op=UNLOAD May 10 00:48:35.984000 audit: BPF prog-id=35 op=LOAD May 10 00:48:35.984000 audit: BPF prog-id=21 op=UNLOAD May 10 00:48:35.984000 audit: BPF prog-id=36 op=LOAD May 10 00:48:35.984000 audit: BPF prog-id=37 op=LOAD May 10 00:48:35.984000 audit: BPF prog-id=22 op=UNLOAD May 10 00:48:35.984000 audit: BPF prog-id=23 op=UNLOAD May 10 00:48:35.985000 audit: BPF prog-id=38 op=LOAD May 10 00:48:35.985000 audit: BPF prog-id=26 op=UNLOAD May 10 00:48:35.989055 systemd[1]: Finished ldconfig.service. May 10 00:48:35.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.989841 systemd[1]: Finished systemd-boot-update.service. May 10 00:48:35.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.991708 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:48:35.991000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:35.995524 systemd[1]: Starting audit-rules.service... May 10 00:48:35.997468 systemd[1]: Starting clean-ca-certificates.service... May 10 00:48:36.003000 audit: BPF prog-id=39 op=LOAD May 10 00:48:35.999528 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:48:36.005083 systemd[1]: Starting systemd-resolved.service... May 10 00:48:36.005000 audit: BPF prog-id=40 op=LOAD May 10 00:48:36.007666 systemd[1]: Starting systemd-timesyncd.service... May 10 00:48:36.011546 systemd[1]: Starting systemd-update-utmp.service... May 10 00:48:36.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.013353 systemd[1]: Finished clean-ca-certificates.service. May 10 00:48:36.014376 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:48:36.027000 audit[1134]: SYSTEM_BOOT pid=1134 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:48:36.033704 systemd[1]: Finished systemd-update-utmp.service. May 10 00:48:36.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.036137 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:48:36.037772 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:48:36.041357 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:48:36.053481 systemd[1]: Starting modprobe@loop.service... May 10 00:48:36.054346 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:48:36.054607 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:48:36.054867 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:48:36.056538 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:48:36.056840 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:48:36.057000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.059540 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:48:36.060758 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:48:36.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.062196 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:48:36.065212 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:48:36.068237 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:48:36.073319 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:48:36.074076 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:48:36.074327 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:48:36.074527 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:48:36.075738 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:48:36.076401 systemd[1]: Finished modprobe@loop.service. May 10 00:48:36.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.076000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.077448 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:48:36.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.078550 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:48:36.078702 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:48:36.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.080263 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:48:36.084017 systemd[1]: Starting systemd-update-done.service... May 10 00:48:36.088738 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:48:36.091412 systemd[1]: Starting modprobe@drm.service... May 10 00:48:36.094556 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:48:36.096594 systemd[1]: Starting modprobe@loop.service... May 10 00:48:36.097232 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:48:36.097443 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:48:36.101641 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:48:36.102252 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:48:36.103685 systemd[1]: Finished systemd-update-done.service. May 10 00:48:36.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.107163 systemd[1]: Finished ensure-sysext.service. May 10 00:48:36.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.111840 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:48:36.112006 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:48:36.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.121413 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:48:36.121632 systemd[1]: Finished modprobe@drm.service. May 10 00:48:36.122593 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:48:36.122817 systemd[1]: Finished modprobe@loop.service. May 10 00:48:36.123441 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:48:36.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.121000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.123809 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:48:36.123953 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:48:36.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.123000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:36.124731 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:48:36.145000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:48:36.145000 audit[1158]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe9bb933a0 a2=420 a3=0 items=0 ppid=1128 pid=1158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:36.145000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:48:36.147369 augenrules[1158]: No rules May 10 00:48:36.147413 systemd[1]: Finished audit-rules.service. May 10 00:48:36.155472 systemd[1]: Started systemd-timesyncd.service. May 10 00:48:36.156021 systemd[1]: Reached target time-set.target. May 10 00:48:36.166929 systemd-resolved[1131]: Positive Trust Anchors: May 10 00:48:36.166944 systemd-resolved[1131]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:48:36.166977 systemd-resolved[1131]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:48:36.173399 systemd-resolved[1131]: Using system hostname 'ci-3510.3.7-n-7542157996'. May 10 00:48:36.175825 systemd[1]: Started systemd-resolved.service. May 10 00:48:36.176332 systemd[1]: Reached target network.target. May 10 00:48:36.176814 systemd[1]: Reached target nss-lookup.target. May 10 00:48:36.177293 systemd[1]: Reached target sysinit.target. May 10 00:48:36.177855 systemd[1]: Started motdgen.path. May 10 00:48:36.178231 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:48:36.178800 systemd[1]: Started logrotate.timer. May 10 00:48:36.179245 systemd[1]: Started mdadm.timer. May 10 00:48:36.179515 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:48:36.179848 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:48:36.179890 systemd[1]: Reached target paths.target. May 10 00:48:36.180205 systemd[1]: Reached target timers.target. May 10 00:48:36.181025 systemd[1]: Listening on dbus.socket. May 10 00:48:36.183311 systemd[1]: Starting docker.socket... May 10 00:48:36.188068 systemd[1]: Listening on sshd.socket. May 10 00:48:36.188674 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:48:36.189325 systemd[1]: Listening on docker.socket. May 10 00:48:36.189809 systemd[1]: Reached target sockets.target. May 10 00:48:36.190166 systemd[1]: Reached target basic.target. May 10 00:48:36.190492 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:48:36.190519 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:48:36.192057 systemd[1]: Starting containerd.service... May 10 00:48:36.194055 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:48:36.196975 systemd[1]: Starting dbus.service... May 10 00:48:36.200927 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:48:37.247826 systemd[1]: Starting extend-filesystems.service... May 10 00:48:37.256629 jq[1171]: false May 10 00:48:37.248384 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:48:37.249225 systemd-resolved[1131]: Clock change detected. Flushing caches. May 10 00:48:37.253120 systemd[1]: Starting motdgen.service... May 10 00:48:37.256577 systemd[1]: Starting prepare-helm.service... May 10 00:48:37.257568 systemd-timesyncd[1133]: Contacted time server 172.245.210.108:123 (0.flatcar.pool.ntp.org). May 10 00:48:37.257686 systemd-timesyncd[1133]: Initial clock synchronization to Sat 2025-05-10 00:48:37.247349 UTC. May 10 00:48:37.258513 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:48:37.262057 systemd[1]: Starting sshd-keygen.service... May 10 00:48:37.269347 systemd[1]: Starting systemd-logind.service... May 10 00:48:37.269861 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:48:37.269984 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 00:48:37.270716 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:48:37.271918 systemd[1]: Starting update-engine.service... May 10 00:48:37.276293 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:48:37.284479 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:48:37.284719 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:48:37.328664 jq[1181]: true May 10 00:48:37.286703 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:48:37.286924 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:48:37.340670 tar[1185]: linux-amd64/helm May 10 00:48:37.344056 jq[1188]: true May 10 00:48:37.351854 dbus-daemon[1168]: [system] SELinux support is enabled May 10 00:48:37.352117 systemd[1]: Started dbus.service. May 10 00:48:37.354836 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:48:37.354885 systemd[1]: Reached target system-config.target. May 10 00:48:37.355360 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:48:37.355391 systemd[1]: Reached target user-config.target. May 10 00:48:37.368373 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:48:37.368558 systemd[1]: Finished motdgen.service. May 10 00:48:37.393349 update_engine[1180]: I0510 00:48:37.392794 1180 main.cc:92] Flatcar Update Engine starting May 10 00:48:37.395288 extend-filesystems[1172]: Found loop1 May 10 00:48:37.395288 extend-filesystems[1172]: Found vda May 10 00:48:37.395288 extend-filesystems[1172]: Found vda1 May 10 00:48:37.395288 extend-filesystems[1172]: Found vda2 May 10 00:48:37.395288 extend-filesystems[1172]: Found vda3 May 10 00:48:37.395288 extend-filesystems[1172]: Found usr May 10 00:48:37.395288 extend-filesystems[1172]: Found vda4 May 10 00:48:37.395288 extend-filesystems[1172]: Found vda6 May 10 00:48:37.395288 extend-filesystems[1172]: Found vda7 May 10 00:48:37.395288 extend-filesystems[1172]: Found vda9 May 10 00:48:37.395288 extend-filesystems[1172]: Checking size of /dev/vda9 May 10 00:48:37.447450 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks May 10 00:48:37.447540 update_engine[1180]: I0510 00:48:37.425529 1180 update_check_scheduler.cc:74] Next update check in 4m46s May 10 00:48:37.419689 systemd[1]: Started update-engine.service. May 10 00:48:37.471800 extend-filesystems[1172]: Resized partition /dev/vda9 May 10 00:48:37.472628 env[1186]: time="2025-05-10T00:48:37.470386998Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:48:37.422025 systemd[1]: Started locksmithd.service. May 10 00:48:37.474869 extend-filesystems[1220]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:48:37.424977 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:48:37.425015 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:48:37.478377 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:48:37.480160 bash[1217]: Updated "/home/core/.ssh/authorized_keys" May 10 00:48:37.514895 systemd-logind[1179]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:48:37.514927 systemd-logind[1179]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:48:37.517479 systemd-logind[1179]: New seat seat0. May 10 00:48:37.527073 systemd[1]: Started systemd-logind.service. May 10 00:48:37.532409 kernel: EXT4-fs (vda9): resized filesystem to 15121403 May 10 00:48:37.555421 extend-filesystems[1220]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 00:48:37.555421 extend-filesystems[1220]: old_desc_blocks = 1, new_desc_blocks = 8 May 10 00:48:37.555421 extend-filesystems[1220]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. May 10 00:48:37.560227 extend-filesystems[1172]: Resized filesystem in /dev/vda9 May 10 00:48:37.560227 extend-filesystems[1172]: Found vdb May 10 00:48:37.556351 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:48:37.556514 systemd[1]: Finished extend-filesystems.service. May 10 00:48:37.564599 env[1186]: time="2025-05-10T00:48:37.564109384Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:48:37.564599 env[1186]: time="2025-05-10T00:48:37.564362355Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:48:37.567453 env[1186]: time="2025-05-10T00:48:37.566504528Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:48:37.567453 env[1186]: time="2025-05-10T00:48:37.566553894Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:48:37.567453 env[1186]: time="2025-05-10T00:48:37.566942729Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:48:37.567453 env[1186]: time="2025-05-10T00:48:37.566974368Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:48:37.567453 env[1186]: time="2025-05-10T00:48:37.566995004Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:48:37.567453 env[1186]: time="2025-05-10T00:48:37.567010063Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:48:37.567453 env[1186]: time="2025-05-10T00:48:37.567134401Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:48:37.568041 env[1186]: time="2025-05-10T00:48:37.567778750Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:48:37.568387 env[1186]: time="2025-05-10T00:48:37.568353925Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:48:37.573374 env[1186]: time="2025-05-10T00:48:37.573314759Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:48:37.576348 env[1186]: time="2025-05-10T00:48:37.574022235Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:48:37.579833 env[1186]: time="2025-05-10T00:48:37.579766138Z" level=info msg="metadata content store policy set" policy=shared May 10 00:48:37.591653 env[1186]: time="2025-05-10T00:48:37.591528567Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:48:37.591874 env[1186]: time="2025-05-10T00:48:37.591847833Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:48:37.591981 env[1186]: time="2025-05-10T00:48:37.591958797Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:48:37.592116 env[1186]: time="2025-05-10T00:48:37.592092484Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:48:37.592390 env[1186]: time="2025-05-10T00:48:37.592363079Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:48:37.592573 env[1186]: time="2025-05-10T00:48:37.592550845Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:48:37.592673 env[1186]: time="2025-05-10T00:48:37.592653740Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:48:37.592772 env[1186]: time="2025-05-10T00:48:37.592753528Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:48:37.592941 env[1186]: time="2025-05-10T00:48:37.592919275Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:48:37.593049 env[1186]: time="2025-05-10T00:48:37.593028135Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:48:37.593303 env[1186]: time="2025-05-10T00:48:37.593274143Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:48:37.593431 env[1186]: time="2025-05-10T00:48:37.593408640Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:48:37.593706 env[1186]: time="2025-05-10T00:48:37.593680241Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:48:37.594054 env[1186]: time="2025-05-10T00:48:37.594026748Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:48:37.594562 env[1186]: time="2025-05-10T00:48:37.594523670Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:48:37.598178 env[1186]: time="2025-05-10T00:48:37.598125681Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:48:37.598389 env[1186]: time="2025-05-10T00:48:37.598364982Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:48:37.598576 env[1186]: time="2025-05-10T00:48:37.598554015Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:48:37.598674 env[1186]: time="2025-05-10T00:48:37.598654336Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:48:37.598763 env[1186]: time="2025-05-10T00:48:37.598744636Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:48:37.598850 env[1186]: time="2025-05-10T00:48:37.598831695Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:48:37.598939 env[1186]: time="2025-05-10T00:48:37.598919994Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:48:37.601810 env[1186]: time="2025-05-10T00:48:37.601742726Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:48:37.604377 env[1186]: time="2025-05-10T00:48:37.604321623Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:48:37.606399 env[1186]: time="2025-05-10T00:48:37.606344089Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:48:37.606639 env[1186]: time="2025-05-10T00:48:37.606612827Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:48:37.606947 env[1186]: time="2025-05-10T00:48:37.606915659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:48:37.607086 env[1186]: time="2025-05-10T00:48:37.607061948Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:48:37.607182 env[1186]: time="2025-05-10T00:48:37.607162467Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:48:37.607293 env[1186]: time="2025-05-10T00:48:37.607272674Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:48:37.607401 env[1186]: time="2025-05-10T00:48:37.607376846Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:48:37.607485 env[1186]: time="2025-05-10T00:48:37.607464774Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:48:37.607584 env[1186]: time="2025-05-10T00:48:37.607562645Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:48:37.607727 env[1186]: time="2025-05-10T00:48:37.607705703Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:48:37.608164 env[1186]: time="2025-05-10T00:48:37.608085685Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:48:37.617401 env[1186]: time="2025-05-10T00:48:37.617330350Z" level=info msg="Connect containerd service" May 10 00:48:37.617696 env[1186]: time="2025-05-10T00:48:37.617665705Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:48:37.620468 env[1186]: time="2025-05-10T00:48:37.620410087Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:48:37.622440 env[1186]: time="2025-05-10T00:48:37.622372897Z" level=info msg="Start subscribing containerd event" May 10 00:48:37.622750 env[1186]: time="2025-05-10T00:48:37.622725021Z" level=info msg="Start recovering state" May 10 00:48:37.622935 env[1186]: time="2025-05-10T00:48:37.622789437Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:48:37.623104 env[1186]: time="2025-05-10T00:48:37.623083706Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:48:37.623304 env[1186]: time="2025-05-10T00:48:37.623284484Z" level=info msg="containerd successfully booted in 0.161109s" May 10 00:48:37.623381 systemd[1]: Started containerd.service. May 10 00:48:37.668811 env[1186]: time="2025-05-10T00:48:37.668739765Z" level=info msg="Start event monitor" May 10 00:48:37.669111 env[1186]: time="2025-05-10T00:48:37.669065427Z" level=info msg="Start snapshots syncer" May 10 00:48:37.669277 env[1186]: time="2025-05-10T00:48:37.669227941Z" level=info msg="Start cni network conf syncer for default" May 10 00:48:37.669381 env[1186]: time="2025-05-10T00:48:37.669354456Z" level=info msg="Start streaming server" May 10 00:48:37.691438 coreos-metadata[1167]: May 10 00:48:37.689 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:48:37.708647 coreos-metadata[1167]: May 10 00:48:37.707 INFO Fetch successful May 10 00:48:37.716872 unknown[1167]: wrote ssh authorized keys file for user: core May 10 00:48:37.726787 update-ssh-keys[1229]: Updated "/home/core/.ssh/authorized_keys" May 10 00:48:37.727343 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:48:37.777406 systemd-networkd[1000]: eth0: Gained IPv6LL May 10 00:48:37.780777 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:48:37.781511 systemd[1]: Reached target network-online.target. May 10 00:48:37.784140 systemd[1]: Starting kubelet.service... May 10 00:48:37.843012 systemd-networkd[1000]: eth1: Gained IPv6LL May 10 00:48:38.091705 tar[1185]: linux-amd64/LICENSE May 10 00:48:38.091928 tar[1185]: linux-amd64/README.md May 10 00:48:38.097598 systemd[1]: Finished prepare-helm.service. May 10 00:48:38.232894 locksmithd[1221]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:48:38.758784 sshd_keygen[1199]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:48:38.796284 systemd[1]: Finished sshd-keygen.service. May 10 00:48:38.798918 systemd[1]: Starting issuegen.service... May 10 00:48:38.807893 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:48:38.808068 systemd[1]: Finished issuegen.service. May 10 00:48:38.810441 systemd[1]: Starting systemd-user-sessions.service... May 10 00:48:38.819728 systemd[1]: Finished systemd-user-sessions.service. May 10 00:48:38.822095 systemd[1]: Started getty@tty1.service. May 10 00:48:38.824274 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:48:38.824884 systemd[1]: Reached target getty.target. May 10 00:48:38.971987 systemd[1]: Started kubelet.service. May 10 00:48:38.973628 systemd[1]: Reached target multi-user.target. May 10 00:48:38.977345 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:48:38.991706 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:48:38.991976 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:48:38.992751 systemd[1]: Startup finished in 974ms (kernel) + 5.363s (initrd) + 7.750s (userspace) = 14.088s. May 10 00:48:39.078540 systemd[1]: Created slice system-sshd.slice. May 10 00:48:39.080789 systemd[1]: Started sshd@0-137.184.1.116:22-139.178.68.195:55778.service. May 10 00:48:39.171872 sshd[1257]: Accepted publickey for core from 139.178.68.195 port 55778 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:48:39.173533 sshd[1257]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:39.190294 systemd[1]: Created slice user-500.slice. May 10 00:48:39.193570 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:48:39.206190 systemd-logind[1179]: New session 1 of user core. May 10 00:48:39.212177 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:48:39.216526 systemd[1]: Starting user@500.service... May 10 00:48:39.220965 (systemd)[1265]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:39.325081 systemd[1265]: Queued start job for default target default.target. May 10 00:48:39.325963 systemd[1265]: Reached target paths.target. May 10 00:48:39.325986 systemd[1265]: Reached target sockets.target. May 10 00:48:39.326007 systemd[1265]: Reached target timers.target. May 10 00:48:39.326025 systemd[1265]: Reached target basic.target. May 10 00:48:39.326085 systemd[1265]: Reached target default.target. May 10 00:48:39.326163 systemd[1265]: Startup finished in 95ms. May 10 00:48:39.326546 systemd[1]: Started user@500.service. May 10 00:48:39.327993 systemd[1]: Started session-1.scope. May 10 00:48:39.400624 systemd[1]: Started sshd@1-137.184.1.116:22-139.178.68.195:55784.service. May 10 00:48:39.476408 sshd[1274]: Accepted publickey for core from 139.178.68.195 port 55784 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:48:39.477409 sshd[1274]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:39.485098 systemd[1]: Started session-2.scope. May 10 00:48:39.486140 systemd-logind[1179]: New session 2 of user core. May 10 00:48:39.563789 sshd[1274]: pam_unix(sshd:session): session closed for user core May 10 00:48:39.570444 systemd[1]: Started sshd@2-137.184.1.116:22-139.178.68.195:55786.service. May 10 00:48:39.571437 systemd[1]: sshd@1-137.184.1.116:22-139.178.68.195:55784.service: Deactivated successfully. May 10 00:48:39.573048 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:48:39.575012 systemd-logind[1179]: Session 2 logged out. Waiting for processes to exit. May 10 00:48:39.576479 systemd-logind[1179]: Removed session 2. May 10 00:48:39.627374 sshd[1279]: Accepted publickey for core from 139.178.68.195 port 55786 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:48:39.629683 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:39.638348 systemd[1]: Started session-3.scope. May 10 00:48:39.638903 systemd-logind[1179]: New session 3 of user core. May 10 00:48:39.710180 sshd[1279]: pam_unix(sshd:session): session closed for user core May 10 00:48:39.716980 systemd[1]: Started sshd@3-137.184.1.116:22-139.178.68.195:55796.service. May 10 00:48:39.718476 systemd[1]: sshd@2-137.184.1.116:22-139.178.68.195:55786.service: Deactivated successfully. May 10 00:48:39.720185 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:48:39.722015 systemd-logind[1179]: Session 3 logged out. Waiting for processes to exit. May 10 00:48:39.727686 systemd-logind[1179]: Removed session 3. May 10 00:48:39.777163 sshd[1285]: Accepted publickey for core from 139.178.68.195 port 55796 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:48:39.779541 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:39.786572 systemd-logind[1179]: New session 4 of user core. May 10 00:48:39.787020 systemd[1]: Started session-4.scope. May 10 00:48:39.820436 kubelet[1254]: E0510 00:48:39.820366 1254 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:48:39.823289 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:48:39.823503 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:48:39.823825 systemd[1]: kubelet.service: Consumed 1.319s CPU time. May 10 00:48:39.861868 sshd[1285]: pam_unix(sshd:session): session closed for user core May 10 00:48:39.866724 systemd[1]: sshd@3-137.184.1.116:22-139.178.68.195:55796.service: Deactivated successfully. May 10 00:48:39.867474 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:48:39.868380 systemd-logind[1179]: Session 4 logged out. Waiting for processes to exit. May 10 00:48:39.870351 systemd[1]: Started sshd@4-137.184.1.116:22-139.178.68.195:55808.service. May 10 00:48:39.872466 systemd-logind[1179]: Removed session 4. May 10 00:48:39.918661 sshd[1292]: Accepted publickey for core from 139.178.68.195 port 55808 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:48:39.920873 sshd[1292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:39.927591 systemd[1]: Started session-5.scope. May 10 00:48:39.928375 systemd-logind[1179]: New session 5 of user core. May 10 00:48:39.999122 sudo[1295]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:48:40.000307 sudo[1295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:48:40.011642 dbus-daemon[1168]: \xd0\u001dֱ\xefU: received setenforce notice (enforcing=-1052551952) May 10 00:48:40.013913 sudo[1295]: pam_unix(sudo:session): session closed for user root May 10 00:48:40.018846 sshd[1292]: pam_unix(sshd:session): session closed for user core May 10 00:48:40.025223 systemd[1]: Started sshd@5-137.184.1.116:22-139.178.68.195:55822.service. May 10 00:48:40.027223 systemd[1]: sshd@4-137.184.1.116:22-139.178.68.195:55808.service: Deactivated successfully. May 10 00:48:40.028264 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:48:40.029652 systemd-logind[1179]: Session 5 logged out. Waiting for processes to exit. May 10 00:48:40.031988 systemd-logind[1179]: Removed session 5. May 10 00:48:40.071350 sshd[1298]: Accepted publickey for core from 139.178.68.195 port 55822 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:48:40.073649 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:40.079329 systemd[1]: Started session-6.scope. May 10 00:48:40.080082 systemd-logind[1179]: New session 6 of user core. May 10 00:48:40.141498 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:48:40.142206 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:48:40.146153 sudo[1303]: pam_unix(sudo:session): session closed for user root May 10 00:48:40.154049 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:48:40.154347 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:48:40.166647 systemd[1]: Stopping audit-rules.service... May 10 00:48:40.167000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:48:40.167000 audit[1306]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc6ddd1750 a2=420 a3=0 items=0 ppid=1 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.167000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:48:40.169225 auditctl[1306]: No rules May 10 00:48:40.169514 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:48:40.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:40.169706 systemd[1]: Stopped audit-rules.service. May 10 00:48:40.171723 systemd[1]: Starting audit-rules.service... May 10 00:48:40.197026 augenrules[1323]: No rules May 10 00:48:40.198218 systemd[1]: Finished audit-rules.service. May 10 00:48:40.197000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:40.198000 audit[1302]: USER_END pid=1302 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:48:40.198000 audit[1302]: CRED_DISP pid=1302 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:48:40.199603 sudo[1302]: pam_unix(sudo:session): session closed for user root May 10 00:48:40.202699 sshd[1298]: pam_unix(sshd:session): session closed for user core May 10 00:48:40.202000 audit[1298]: USER_END pid=1298 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:48:40.202000 audit[1298]: CRED_DISP pid=1298 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:48:40.207720 systemd[1]: sshd@5-137.184.1.116:22-139.178.68.195:55822.service: Deactivated successfully. May 10 00:48:40.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-137.184.1.116:22-139.178.68.195:55822 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:40.208468 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:48:40.209154 systemd-logind[1179]: Session 6 logged out. Waiting for processes to exit. May 10 00:48:40.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.1.116:22-139.178.68.195:55838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:40.210509 systemd[1]: Started sshd@6-137.184.1.116:22-139.178.68.195:55838.service. May 10 00:48:40.211917 systemd-logind[1179]: Removed session 6. May 10 00:48:40.255000 audit[1329]: USER_ACCT pid=1329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:48:40.256896 sshd[1329]: Accepted publickey for core from 139.178.68.195 port 55838 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:48:40.258000 audit[1329]: CRED_ACQ pid=1329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:48:40.258000 audit[1329]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc35cb3080 a2=3 a3=0 items=0 ppid=1 pid=1329 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.258000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:48:40.260816 sshd[1329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:48:40.267426 systemd[1]: Started session-7.scope. May 10 00:48:40.268002 systemd-logind[1179]: New session 7 of user core. May 10 00:48:40.274000 audit[1329]: USER_START pid=1329 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:48:40.276000 audit[1331]: CRED_ACQ pid=1331 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:48:40.331000 audit[1332]: USER_ACCT pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:48:40.333126 sudo[1332]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:48:40.332000 audit[1332]: CRED_REFR pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:48:40.334112 sudo[1332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:48:40.336000 audit[1332]: USER_START pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:48:40.379902 systemd[1]: Starting docker.service... May 10 00:48:40.467967 env[1342]: time="2025-05-10T00:48:40.467862643Z" level=info msg="Starting up" May 10 00:48:40.470280 env[1342]: time="2025-05-10T00:48:40.470219317Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:48:40.470800 env[1342]: time="2025-05-10T00:48:40.470468962Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:48:40.470974 env[1342]: time="2025-05-10T00:48:40.470947946Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:48:40.471052 env[1342]: time="2025-05-10T00:48:40.471036590Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:48:40.473392 env[1342]: time="2025-05-10T00:48:40.473347330Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:48:40.473392 env[1342]: time="2025-05-10T00:48:40.473381011Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:48:40.473593 env[1342]: time="2025-05-10T00:48:40.473406986Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:48:40.473593 env[1342]: time="2025-05-10T00:48:40.473417353Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:48:40.483413 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport3280014402-merged.mount: Deactivated successfully. May 10 00:48:40.547781 env[1342]: time="2025-05-10T00:48:40.547636128Z" level=info msg="Loading containers: start." May 10 00:48:40.639000 audit[1374]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.639000 audit[1374]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd3a1316a0 a2=0 a3=7ffd3a13168c items=0 ppid=1342 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.639000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:48:40.642000 audit[1376]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1376 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.642000 audit[1376]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffe8413abc0 a2=0 a3=7ffe8413abac items=0 ppid=1342 pid=1376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.642000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:48:40.645000 audit[1378]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1378 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.645000 audit[1378]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffffc3316d0 a2=0 a3=7ffffc3316bc items=0 ppid=1342 pid=1378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.645000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:48:40.648000 audit[1380]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.648000 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc9da71520 a2=0 a3=7ffc9da7150c items=0 ppid=1342 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.648000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:48:40.651000 audit[1382]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.651000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd9b6022b0 a2=0 a3=7ffd9b60229c items=0 ppid=1342 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.651000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:48:40.671000 audit[1387]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.671000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe589a5220 a2=0 a3=7ffe589a520c items=0 ppid=1342 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.671000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:48:40.678000 audit[1389]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.678000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff9685b110 a2=0 a3=7fff9685b0fc items=0 ppid=1342 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:48:40.681000 audit[1391]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.681000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffeb58d720 a2=0 a3=7fffeb58d70c items=0 ppid=1342 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.681000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:48:40.685000 audit[1393]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.685000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc010ef7b0 a2=0 a3=7ffc010ef79c items=0 ppid=1342 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:48:40.694000 audit[1397]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.694000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffde79fe750 a2=0 a3=7ffde79fe73c items=0 ppid=1342 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.694000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:48:40.699000 audit[1398]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.699000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcef5dc580 a2=0 a3=7ffcef5dc56c items=0 ppid=1342 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.699000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:48:40.717278 kernel: Initializing XFRM netlink socket May 10 00:48:40.761973 env[1342]: time="2025-05-10T00:48:40.761925218Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:48:40.797000 audit[1406]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.810671 kernel: kauditd_printk_skb: 232 callbacks suppressed May 10 00:48:40.810764 kernel: audit: type=1325 audit(1746838120.797:255): table=nat:13 family=2 entries=2 op=nft_register_chain pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.815493 kernel: audit: type=1300 audit(1746838120.797:255): arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc44292130 a2=0 a3=7ffc4429211c items=0 ppid=1342 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.815625 kernel: audit: type=1327 audit(1746838120.797:255): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:48:40.797000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc44292130 a2=0 a3=7ffc4429211c items=0 ppid=1342 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.797000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:48:40.815000 audit[1409]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.819359 kernel: audit: type=1325 audit(1746838120.815:256): table=nat:14 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.819456 kernel: audit: type=1300 audit(1746838120.815:256): arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffee123d710 a2=0 a3=7ffee123d6fc items=0 ppid=1342 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.815000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffee123d710 a2=0 a3=7ffee123d6fc items=0 ppid=1342 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.815000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:48:40.824843 kernel: audit: type=1327 audit(1746838120.815:256): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:48:40.824948 kernel: audit: type=1325 audit(1746838120.818:257): table=filter:15 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.818000 audit[1412]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.818000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcc5e56ed0 a2=0 a3=7ffcc5e56ebc items=0 ppid=1342 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.829974 kernel: audit: type=1300 audit(1746838120.818:257): arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffcc5e56ed0 a2=0 a3=7ffcc5e56ebc items=0 ppid=1342 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.830072 kernel: audit: type=1327 audit(1746838120.818:257): proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:48:40.818000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:48:40.822000 audit[1414]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.834108 kernel: audit: type=1325 audit(1746838120.822:258): table=filter:16 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.822000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd3aab4210 a2=0 a3=7ffd3aab41fc items=0 ppid=1342 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:48:40.826000 audit[1416]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.826000 audit[1416]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff71d04b90 a2=0 a3=7fff71d04b7c items=0 ppid=1342 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.826000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:48:40.829000 audit[1418]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.829000 audit[1418]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe0e08f780 a2=0 a3=7ffe0e08f76c items=0 ppid=1342 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.829000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:48:40.831000 audit[1420]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.831000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffc6886f8b0 a2=0 a3=7ffc6886f89c items=0 ppid=1342 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.831000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:48:40.845000 audit[1423]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.845000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffed6889f0 a2=0 a3=7fffed6889dc items=0 ppid=1342 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.845000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:48:40.849000 audit[1425]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.849000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff0f359c60 a2=0 a3=7fff0f359c4c items=0 ppid=1342 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.849000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:48:40.852000 audit[1427]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.852000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fffd8f86480 a2=0 a3=7fffd8f8646c items=0 ppid=1342 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.852000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:48:40.855000 audit[1429]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.855000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe59522620 a2=0 a3=7ffe5952260c items=0 ppid=1342 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.855000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:48:40.857386 systemd-networkd[1000]: docker0: Link UP May 10 00:48:40.865000 audit[1433]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.865000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd2f1127a0 a2=0 a3=7ffd2f11278c items=0 ppid=1342 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.865000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:48:40.870000 audit[1434]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:40.870000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe38172360 a2=0 a3=7ffe3817234c items=0 ppid=1342 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:40.870000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:48:40.872386 env[1342]: time="2025-05-10T00:48:40.872318259Z" level=info msg="Loading containers: done." May 10 00:48:40.885430 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1787520966-merged.mount: Deactivated successfully. May 10 00:48:40.890447 env[1342]: time="2025-05-10T00:48:40.890377933Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:48:40.890694 env[1342]: time="2025-05-10T00:48:40.890597830Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:48:40.890774 env[1342]: time="2025-05-10T00:48:40.890708524Z" level=info msg="Daemon has completed initialization" May 10 00:48:40.905407 systemd[1]: Started docker.service. May 10 00:48:40.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:40.909723 env[1342]: time="2025-05-10T00:48:40.909621964Z" level=info msg="API listen on /run/docker.sock" May 10 00:48:40.938200 systemd[1]: Starting coreos-metadata.service... May 10 00:48:41.001102 coreos-metadata[1460]: May 10 00:48:41.000 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 May 10 00:48:41.014231 coreos-metadata[1460]: May 10 00:48:41.014 INFO Fetch successful May 10 00:48:41.027283 systemd[1]: Finished coreos-metadata.service. May 10 00:48:41.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:41.907945 env[1186]: time="2025-05-10T00:48:41.907879786Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 10 00:48:42.414989 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount106104729.mount: Deactivated successfully. May 10 00:48:43.844561 env[1186]: time="2025-05-10T00:48:43.844501611Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:43.846741 env[1186]: time="2025-05-10T00:48:43.846677818Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:43.849936 env[1186]: time="2025-05-10T00:48:43.849877505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:43.852449 env[1186]: time="2025-05-10T00:48:43.852398841Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:43.853076 env[1186]: time="2025-05-10T00:48:43.853024253Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 10 00:48:43.854950 env[1186]: time="2025-05-10T00:48:43.854906096Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 10 00:48:45.538756 env[1186]: time="2025-05-10T00:48:45.538685844Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:45.540211 env[1186]: time="2025-05-10T00:48:45.540175482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:45.541946 env[1186]: time="2025-05-10T00:48:45.541907117Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:45.543726 env[1186]: time="2025-05-10T00:48:45.543693850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:45.544768 env[1186]: time="2025-05-10T00:48:45.544733129Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 10 00:48:45.545511 env[1186]: time="2025-05-10T00:48:45.545486193Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 10 00:48:46.917083 env[1186]: time="2025-05-10T00:48:46.917012183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:46.919420 env[1186]: time="2025-05-10T00:48:46.919362859Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:46.920800 env[1186]: time="2025-05-10T00:48:46.920751508Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:46.923421 env[1186]: time="2025-05-10T00:48:46.922855712Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:46.924365 env[1186]: time="2025-05-10T00:48:46.924303354Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 10 00:48:46.925365 env[1186]: time="2025-05-10T00:48:46.925335812Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 10 00:48:48.228639 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4001663619.mount: Deactivated successfully. May 10 00:48:49.023935 env[1186]: time="2025-05-10T00:48:49.023849999Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:49.025380 env[1186]: time="2025-05-10T00:48:49.025325750Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:49.027211 env[1186]: time="2025-05-10T00:48:49.027164823Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:49.028402 env[1186]: time="2025-05-10T00:48:49.028349706Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:49.029110 env[1186]: time="2025-05-10T00:48:49.029070834Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 10 00:48:49.029931 env[1186]: time="2025-05-10T00:48:49.029897586Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 00:48:49.517876 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3998901592.mount: Deactivated successfully. May 10 00:48:49.957730 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:48:49.957996 systemd[1]: Stopped kubelet.service. May 10 00:48:49.958079 systemd[1]: kubelet.service: Consumed 1.319s CPU time. May 10 00:48:49.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:49.960774 kernel: kauditd_printk_skb: 31 callbacks suppressed May 10 00:48:49.960894 kernel: audit: type=1130 audit(1746838129.956:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:49.956000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:49.966372 kernel: audit: type=1131 audit(1746838129.956:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:49.967093 systemd[1]: Starting kubelet.service... May 10 00:48:50.110369 systemd[1]: Started kubelet.service. May 10 00:48:50.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:50.115284 kernel: audit: type=1130 audit(1746838130.109:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:50.207511 kubelet[1483]: E0510 00:48:50.207420 1483 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:48:50.211852 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:48:50.212097 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:48:50.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:48:50.216297 kernel: audit: type=1131 audit(1746838130.211:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:48:50.766737 env[1186]: time="2025-05-10T00:48:50.766670020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:50.768350 env[1186]: time="2025-05-10T00:48:50.768305177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:50.770419 env[1186]: time="2025-05-10T00:48:50.770379240Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:50.771983 env[1186]: time="2025-05-10T00:48:50.771940887Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:50.773134 env[1186]: time="2025-05-10T00:48:50.773086002Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 00:48:50.774091 env[1186]: time="2025-05-10T00:48:50.774037608Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 10 00:48:51.267283 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1716945269.mount: Deactivated successfully. May 10 00:48:51.272466 env[1186]: time="2025-05-10T00:48:51.272382910Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:51.273740 env[1186]: time="2025-05-10T00:48:51.273674352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:51.275661 env[1186]: time="2025-05-10T00:48:51.275608815Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:51.277484 env[1186]: time="2025-05-10T00:48:51.277438969Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:51.278370 env[1186]: time="2025-05-10T00:48:51.278328475Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 10 00:48:51.279372 env[1186]: time="2025-05-10T00:48:51.279321908Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 10 00:48:51.761195 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2171014442.mount: Deactivated successfully. May 10 00:48:54.166313 env[1186]: time="2025-05-10T00:48:54.166244454Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:54.169251 env[1186]: time="2025-05-10T00:48:54.169188700Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:54.171249 env[1186]: time="2025-05-10T00:48:54.171178726Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:54.173668 env[1186]: time="2025-05-10T00:48:54.173618878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:54.174789 env[1186]: time="2025-05-10T00:48:54.174747216Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 10 00:48:57.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:57.494080 systemd[1]: Stopped kubelet.service. May 10 00:48:57.500150 kernel: audit: type=1130 audit(1746838137.493:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:57.500322 kernel: audit: type=1131 audit(1746838137.493:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:57.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:57.500635 systemd[1]: Starting kubelet.service... May 10 00:48:57.515673 systemd[1]: Started sshd@7-137.184.1.116:22-218.92.0.154:45543.service. May 10 00:48:57.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.1.116:22-218.92.0.154:45543 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:57.523216 kernel: audit: type=1130 audit(1746838137.515:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.1.116:22-218.92.0.154:45543 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:57.567852 systemd[1]: Reloading. May 10 00:48:57.693675 /usr/lib/systemd/system-generators/torcx-generator[1536]: time="2025-05-10T00:48:57Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:48:57.693705 /usr/lib/systemd/system-generators/torcx-generator[1536]: time="2025-05-10T00:48:57Z" level=info msg="torcx already run" May 10 00:48:57.815900 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:48:57.817359 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:48:57.848193 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:48:57.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.964000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.975007 kernel: audit: type=1400 audit(1746838137.964:277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.975202 kernel: audit: type=1400 audit(1746838137.964:278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.975314 kernel: audit: type=1400 audit(1746838137.968:279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981969 kernel: audit: type=1400 audit(1746838137.968:280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.982161 kernel: audit: type=1400 audit(1746838137.968:281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988494 kernel: audit: type=1400 audit(1746838137.968:282): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988694 kernel: audit: type=1400 audit(1746838137.968:283): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit: BPF prog-id=46 op=LOAD May 10 00:48:57.971000 audit: BPF prog-id=44 op=UNLOAD May 10 00:48:57.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit: BPF prog-id=47 op=LOAD May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit: BPF prog-id=48 op=LOAD May 10 00:48:57.974000 audit: BPF prog-id=30 op=UNLOAD May 10 00:48:57.974000 audit: BPF prog-id=31 op=UNLOAD May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit: BPF prog-id=49 op=LOAD May 10 00:48:57.978000 audit: BPF prog-id=32 op=UNLOAD May 10 00:48:57.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit: BPF prog-id=50 op=LOAD May 10 00:48:57.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.981000 audit: BPF prog-id=51 op=LOAD May 10 00:48:57.981000 audit: BPF prog-id=33 op=UNLOAD May 10 00:48:57.981000 audit: BPF prog-id=34 op=UNLOAD May 10 00:48:57.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.988000 audit: BPF prog-id=55 op=LOAD May 10 00:48:57.988000 audit: BPF prog-id=40 op=UNLOAD May 10 00:48:57.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.990000 audit: BPF prog-id=56 op=LOAD May 10 00:48:57.990000 audit: BPF prog-id=39 op=UNLOAD May 10 00:48:57.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.997000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.997000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit: BPF prog-id=57 op=LOAD May 10 00:48:57.998000 audit: BPF prog-id=35 op=UNLOAD May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit: BPF prog-id=58 op=LOAD May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit: BPF prog-id=59 op=LOAD May 10 00:48:57.998000 audit: BPF prog-id=36 op=UNLOAD May 10 00:48:57.998000 audit: BPF prog-id=37 op=UNLOAD May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.998000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:57.999000 audit: BPF prog-id=60 op=LOAD May 10 00:48:57.999000 audit: BPF prog-id=38 op=UNLOAD May 10 00:48:58.021923 systemd[1]: Started kubelet.service. May 10 00:48:58.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:58.032486 systemd[1]: Stopping kubelet.service... May 10 00:48:58.033641 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:48:58.033864 systemd[1]: Stopped kubelet.service. May 10 00:48:58.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:58.036300 systemd[1]: Starting kubelet.service... May 10 00:48:58.157804 systemd[1]: Started kubelet.service. May 10 00:48:58.158000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:48:58.225567 kubelet[1593]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:48:58.225567 kubelet[1593]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:48:58.225567 kubelet[1593]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:48:58.228991 kubelet[1593]: I0510 00:48:58.228879 1593 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:48:58.407000 audit[1511]: USER_AUTH pid=1511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.154 addr=218.92.0.154 terminal=ssh res=failed' May 10 00:48:58.407933 sshd[1511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154 user=root May 10 00:48:58.798041 kubelet[1593]: I0510 00:48:58.797917 1593 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 00:48:58.798041 kubelet[1593]: I0510 00:48:58.798031 1593 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:48:58.798674 kubelet[1593]: I0510 00:48:58.798571 1593 server.go:929] "Client rotation is on, will bootstrap in background" May 10 00:48:58.844953 kubelet[1593]: E0510 00:48:58.844886 1593 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://137.184.1.116:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:48:58.847162 kubelet[1593]: I0510 00:48:58.847112 1593 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:48:58.858982 kubelet[1593]: E0510 00:48:58.858921 1593 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:48:58.859272 kubelet[1593]: I0510 00:48:58.859223 1593 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:48:58.864432 kubelet[1593]: I0510 00:48:58.864393 1593 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:48:58.864743 kubelet[1593]: I0510 00:48:58.864726 1593 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 00:48:58.865001 kubelet[1593]: I0510 00:48:58.864962 1593 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:48:58.865295 kubelet[1593]: I0510 00:48:58.865096 1593 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-7542157996","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:48:58.865610 kubelet[1593]: I0510 00:48:58.865592 1593 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:48:58.865708 kubelet[1593]: I0510 00:48:58.865697 1593 container_manager_linux.go:300] "Creating device plugin manager" May 10 00:48:58.865875 kubelet[1593]: I0510 00:48:58.865863 1593 state_mem.go:36] "Initialized new in-memory state store" May 10 00:48:58.870462 kubelet[1593]: I0510 00:48:58.870416 1593 kubelet.go:408] "Attempting to sync node with API server" May 10 00:48:58.870748 kubelet[1593]: I0510 00:48:58.870726 1593 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:48:58.870900 kubelet[1593]: I0510 00:48:58.870883 1593 kubelet.go:314] "Adding apiserver pod source" May 10 00:48:58.871002 kubelet[1593]: I0510 00:48:58.870986 1593 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:48:58.882274 kubelet[1593]: W0510 00:48:58.882099 1593 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://137.184.1.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-7542157996&limit=500&resourceVersion=0": dial tcp 137.184.1.116:6443: connect: connection refused May 10 00:48:58.882274 kubelet[1593]: E0510 00:48:58.882184 1593 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://137.184.1.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-7542157996&limit=500&resourceVersion=0\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:48:58.885633 kubelet[1593]: W0510 00:48:58.885523 1593 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://137.184.1.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 137.184.1.116:6443: connect: connection refused May 10 00:48:58.885971 kubelet[1593]: E0510 00:48:58.885935 1593 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://137.184.1.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:48:58.886271 kubelet[1593]: I0510 00:48:58.886248 1593 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:48:58.892199 kubelet[1593]: I0510 00:48:58.892141 1593 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:48:58.893502 kubelet[1593]: W0510 00:48:58.893390 1593 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:48:58.895157 kubelet[1593]: I0510 00:48:58.895123 1593 server.go:1269] "Started kubelet" May 10 00:48:58.897386 kubelet[1593]: I0510 00:48:58.897338 1593 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:48:58.897681 kubelet[1593]: I0510 00:48:58.897649 1593 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:48:58.897901 kubelet[1593]: I0510 00:48:58.897883 1593 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:48:58.896000 audit[1593]: AVC avc: denied { mac_admin } for pid=1593 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:58.896000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:48:58.896000 audit[1593]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005f5bf0 a1=c0009fd470 a2=c0005f5bc0 a3=25 items=0 ppid=1 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.896000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:48:58.896000 audit[1593]: AVC avc: denied { mac_admin } for pid=1593 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:58.896000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:48:58.896000 audit[1593]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b124e0 a1=c0009fd488 a2=c0005f5c80 a3=25 items=0 ppid=1 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.896000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:48:58.906000 audit[1604]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1604 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:58.906000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdda2abb10 a2=0 a3=7ffdda2abafc items=0 ppid=1593 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:48:58.909313 kubelet[1593]: E0510 00:48:58.907519 1593 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://137.184.1.116:6443/api/v1/namespaces/default/events\": dial tcp 137.184.1.116:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-7542157996.183e04083cf235f2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-7542157996,UID:ci-3510.3.7-n-7542157996,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-7542157996,},FirstTimestamp:2025-05-10 00:48:58.89508709 +0000 UTC m=+0.723668481,LastTimestamp:2025-05-10 00:48:58.89508709 +0000 UTC m=+0.723668481,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-7542157996,}" May 10 00:48:58.910046 kubelet[1593]: I0510 00:48:58.909995 1593 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:48:58.909000 audit[1605]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:58.909000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf6cb6500 a2=0 a3=7ffcf6cb64ec items=0 ppid=1593 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:48:58.911471 kubelet[1593]: I0510 00:48:58.911444 1593 server.go:460] "Adding debug handlers to kubelet server" May 10 00:48:58.913175 kubelet[1593]: I0510 00:48:58.913112 1593 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:48:58.913637 kubelet[1593]: I0510 00:48:58.913615 1593 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:48:58.914528 kubelet[1593]: I0510 00:48:58.913982 1593 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 00:48:58.914814 kubelet[1593]: E0510 00:48:58.914784 1593 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.7-n-7542157996\" not found" May 10 00:48:58.915021 kubelet[1593]: I0510 00:48:58.914378 1593 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:48:58.919668 kubelet[1593]: I0510 00:48:58.914027 1593 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 00:48:58.920359 kubelet[1593]: E0510 00:48:58.920090 1593 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.1.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-7542157996?timeout=10s\": dial tcp 137.184.1.116:6443: connect: connection refused" interval="200ms" May 10 00:48:58.920509 kubelet[1593]: I0510 00:48:58.919818 1593 reconciler.go:26] "Reconciler: start to sync state" May 10 00:48:58.922475 kubelet[1593]: W0510 00:48:58.922389 1593 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://137.184.1.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 137.184.1.116:6443: connect: connection refused May 10 00:48:58.922801 kubelet[1593]: E0510 00:48:58.922771 1593 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://137.184.1.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:48:58.922909 kubelet[1593]: E0510 00:48:58.922889 1593 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:48:58.924907 kubelet[1593]: I0510 00:48:58.924872 1593 factory.go:221] Registration of the containerd container factory successfully May 10 00:48:58.925103 kubelet[1593]: I0510 00:48:58.925083 1593 factory.go:221] Registration of the systemd container factory successfully May 10 00:48:58.925683 kubelet[1593]: I0510 00:48:58.925643 1593 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:48:58.927000 audit[1607]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:58.927000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff0979dba0 a2=0 a3=7fff0979db8c items=0 ppid=1593 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.927000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:48:58.940719 kubelet[1593]: I0510 00:48:58.940682 1593 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:48:58.940949 kubelet[1593]: I0510 00:48:58.940923 1593 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:48:58.941123 kubelet[1593]: I0510 00:48:58.941103 1593 state_mem.go:36] "Initialized new in-memory state store" May 10 00:48:58.942000 audit[1611]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1611 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:58.942000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdea202320 a2=0 a3=7ffdea20230c items=0 ppid=1593 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.942000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:48:58.944108 kubelet[1593]: I0510 00:48:58.944073 1593 policy_none.go:49] "None policy: Start" May 10 00:48:58.945769 kubelet[1593]: I0510 00:48:58.945736 1593 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:48:58.946129 kubelet[1593]: I0510 00:48:58.946106 1593 state_mem.go:35] "Initializing new in-memory state store" May 10 00:48:58.954112 systemd[1]: Created slice kubepods.slice. May 10 00:48:58.963502 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:48:58.965000 audit[1615]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1615 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:58.965000 audit[1615]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff3bcefcc0 a2=0 a3=7fff3bcefcac items=0 ppid=1593 pid=1615 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.966919 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:48:58.965000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:48:58.969658 kubelet[1593]: I0510 00:48:58.969604 1593 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:48:58.969000 audit[1617]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:58.969000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe0664c910 a2=0 a3=7ffe0664c8fc items=0 ppid=1593 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:48:58.970000 audit[1616]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:48:58.970000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff43da0410 a2=0 a3=7fff43da03fc items=0 ppid=1593 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.970000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:48:58.972305 kubelet[1593]: I0510 00:48:58.972269 1593 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:48:58.972305 kubelet[1593]: I0510 00:48:58.972307 1593 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:48:58.972431 kubelet[1593]: I0510 00:48:58.972331 1593 kubelet.go:2321] "Starting kubelet main sync loop" May 10 00:48:58.972431 kubelet[1593]: E0510 00:48:58.972400 1593 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:48:58.973000 audit[1619]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:48:58.973000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5d5c7fa0 a2=0 a3=7fff5d5c7f8c items=0 ppid=1593 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.973000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:48:58.976000 audit[1621]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:48:58.976000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc5af40210 a2=0 a3=7ffc5af401fc items=0 ppid=1593 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.976000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:48:58.979671 kubelet[1593]: W0510 00:48:58.979615 1593 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://137.184.1.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 137.184.1.116:6443: connect: connection refused May 10 00:48:58.979916 kubelet[1593]: E0510 00:48:58.979886 1593 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://137.184.1.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:48:58.980510 kubelet[1593]: I0510 00:48:58.979999 1593 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:48:58.979000 audit[1593]: AVC avc: denied { mac_admin } for pid=1593 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:58.979000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:48:58.979000 audit[1622]: NETFILTER_CFG table=filter:35 family=10 entries=2 op=nft_register_chain pid=1622 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:48:58.979000 audit[1622]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff89f4b8a0 a2=0 a3=7fff89f4b88c items=0 ppid=1593 pid=1622 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.979000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:48:58.979000 audit[1593]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a7c540 a1=c000a7e198 a2=c000a7c510 a3=25 items=0 ppid=1 pid=1593 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.979000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:48:58.981220 kubelet[1593]: I0510 00:48:58.981199 1593 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:48:58.981606 kubelet[1593]: I0510 00:48:58.981589 1593 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:48:58.981773 kubelet[1593]: I0510 00:48:58.981738 1593 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:48:58.982578 kubelet[1593]: I0510 00:48:58.982150 1593 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:48:58.983334 kubelet[1593]: E0510 00:48:58.983308 1593 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.7-n-7542157996\" not found" May 10 00:48:58.982000 audit[1618]: NETFILTER_CFG table=nat:36 family=2 entries=1 op=nft_register_chain pid=1618 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:58.982000 audit[1618]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff36831a90 a2=0 a3=7fff36831a7c items=0 ppid=1593 pid=1618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:48:58.984000 audit[1625]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1625 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:48:58.984000 audit[1625]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7f811da0 a2=0 a3=7ffe7f811d8c items=0 ppid=1593 pid=1625 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:58.984000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:48:59.083114 systemd[1]: Created slice kubepods-burstable-pod8a7ea7eff628f3100173972586061e78.slice. May 10 00:48:59.089486 kubelet[1593]: I0510 00:48:59.088537 1593 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-7542157996" May 10 00:48:59.089486 kubelet[1593]: E0510 00:48:59.089192 1593 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://137.184.1.116:6443/api/v1/nodes\": dial tcp 137.184.1.116:6443: connect: connection refused" node="ci-3510.3.7-n-7542157996" May 10 00:48:59.112344 systemd[1]: Created slice kubepods-burstable-pod3260a769d378dc89a49b1053255350a0.slice. May 10 00:48:59.121690 kubelet[1593]: E0510 00:48:59.121061 1593 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.1.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-7542157996?timeout=10s\": dial tcp 137.184.1.116:6443: connect: connection refused" interval="400ms" May 10 00:48:59.122067 kubelet[1593]: I0510 00:48:59.122037 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:48:59.123425 kubelet[1593]: I0510 00:48:59.123387 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:48:59.123622 kubelet[1593]: I0510 00:48:59.123602 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:48:59.123722 kubelet[1593]: I0510 00:48:59.123707 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:48:59.124230 kubelet[1593]: I0510 00:48:59.123798 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/61661591a1b375a8d43267c92f66d598-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-7542157996\" (UID: \"61661591a1b375a8d43267c92f66d598\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-7542157996" May 10 00:48:59.124071 systemd[1]: Created slice kubepods-burstable-pod61661591a1b375a8d43267c92f66d598.slice. May 10 00:48:59.124606 kubelet[1593]: I0510 00:48:59.124566 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a7ea7eff628f3100173972586061e78-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-7542157996\" (UID: \"8a7ea7eff628f3100173972586061e78\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" May 10 00:48:59.124748 kubelet[1593]: I0510 00:48:59.124728 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a7ea7eff628f3100173972586061e78-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-7542157996\" (UID: \"8a7ea7eff628f3100173972586061e78\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" May 10 00:48:59.124957 kubelet[1593]: I0510 00:48:59.124926 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a7ea7eff628f3100173972586061e78-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-7542157996\" (UID: \"8a7ea7eff628f3100173972586061e78\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" May 10 00:48:59.125041 kubelet[1593]: I0510 00:48:59.124974 1593 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:48:59.290876 kubelet[1593]: I0510 00:48:59.290831 1593 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-7542157996" May 10 00:48:59.292013 kubelet[1593]: E0510 00:48:59.291971 1593 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://137.184.1.116:6443/api/v1/nodes\": dial tcp 137.184.1.116:6443: connect: connection refused" node="ci-3510.3.7-n-7542157996" May 10 00:48:59.409801 kubelet[1593]: E0510 00:48:59.408479 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:48:59.409971 env[1186]: time="2025-05-10T00:48:59.409362006Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-7542157996,Uid:8a7ea7eff628f3100173972586061e78,Namespace:kube-system,Attempt:0,}" May 10 00:48:59.419528 kubelet[1593]: E0510 00:48:59.419474 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:48:59.420195 env[1186]: time="2025-05-10T00:48:59.420125366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-7542157996,Uid:3260a769d378dc89a49b1053255350a0,Namespace:kube-system,Attempt:0,}" May 10 00:48:59.428230 kubelet[1593]: E0510 00:48:59.428192 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:48:59.429297 env[1186]: time="2025-05-10T00:48:59.428986520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-7542157996,Uid:61661591a1b375a8d43267c92f66d598,Namespace:kube-system,Attempt:0,}" May 10 00:48:59.522662 kubelet[1593]: E0510 00:48:59.522571 1593 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.1.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-7542157996?timeout=10s\": dial tcp 137.184.1.116:6443: connect: connection refused" interval="800ms" May 10 00:48:59.569911 kubelet[1593]: E0510 00:48:59.569771 1593 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://137.184.1.116:6443/api/v1/namespaces/default/events\": dial tcp 137.184.1.116:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.7-n-7542157996.183e04083cf235f2 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.7-n-7542157996,UID:ci-3510.3.7-n-7542157996,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.7-n-7542157996,},FirstTimestamp:2025-05-10 00:48:58.89508709 +0000 UTC m=+0.723668481,LastTimestamp:2025-05-10 00:48:58.89508709 +0000 UTC m=+0.723668481,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.7-n-7542157996,}" May 10 00:48:59.694868 kubelet[1593]: I0510 00:48:59.694056 1593 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-7542157996" May 10 00:48:59.694868 kubelet[1593]: E0510 00:48:59.694453 1593 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://137.184.1.116:6443/api/v1/nodes\": dial tcp 137.184.1.116:6443: connect: connection refused" node="ci-3510.3.7-n-7542157996" May 10 00:48:59.839837 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2347255337.mount: Deactivated successfully. May 10 00:48:59.841650 env[1186]: time="2025-05-10T00:48:59.841527898Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.847374 env[1186]: time="2025-05-10T00:48:59.847306475Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.849386 env[1186]: time="2025-05-10T00:48:59.849323078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.854040 env[1186]: time="2025-05-10T00:48:59.853967714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.856323 env[1186]: time="2025-05-10T00:48:59.856267834Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.857002 env[1186]: time="2025-05-10T00:48:59.856945567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.861485 env[1186]: time="2025-05-10T00:48:59.861405601Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.864829 env[1186]: time="2025-05-10T00:48:59.864751826Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.866046 env[1186]: time="2025-05-10T00:48:59.865978120Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.867025 env[1186]: time="2025-05-10T00:48:59.866970409Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.868102 env[1186]: time="2025-05-10T00:48:59.868037140Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.882430 env[1186]: time="2025-05-10T00:48:59.882366742Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:48:59.906223 env[1186]: time="2025-05-10T00:48:59.905877176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:48:59.906223 env[1186]: time="2025-05-10T00:48:59.905971223Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:48:59.906223 env[1186]: time="2025-05-10T00:48:59.905982797Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:48:59.906630 env[1186]: time="2025-05-10T00:48:59.906174893Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0659700d49fc3ec632691e9f99d98e64655ba9c403fd9780fcad313a7615e2b4 pid=1634 runtime=io.containerd.runc.v2 May 10 00:48:59.943547 env[1186]: time="2025-05-10T00:48:59.937674926Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:48:59.943974 env[1186]: time="2025-05-10T00:48:59.943921349Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:48:59.944120 env[1186]: time="2025-05-10T00:48:59.943956018Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:48:59.944575 env[1186]: time="2025-05-10T00:48:59.944221759Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f3a57c73457bf30a8b05234b3bbe2aafee12d1528105101a25f8cc16663632e9 pid=1654 runtime=io.containerd.runc.v2 May 10 00:48:59.950743 systemd[1]: Started cri-containerd-0659700d49fc3ec632691e9f99d98e64655ba9c403fd9780fcad313a7615e2b4.scope. May 10 00:48:59.971395 env[1186]: time="2025-05-10T00:48:59.970391213Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:48:59.971395 env[1186]: time="2025-05-10T00:48:59.970961846Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:48:59.971395 env[1186]: time="2025-05-10T00:48:59.971015288Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:48:59.972381 env[1186]: time="2025-05-10T00:48:59.972264546Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34b8a513d9b647ecaf526ac9e8e2c0d3ba053bbedae6fe75641bee0aa4c51d66 pid=1673 runtime=io.containerd.runc.v2 May 10 00:48:59.976996 kubelet[1593]: W0510 00:48:59.976924 1593 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://137.184.1.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-7542157996&limit=500&resourceVersion=0": dial tcp 137.184.1.116:6443: connect: connection refused May 10 00:48:59.976996 kubelet[1593]: E0510 00:48:59.977001 1593 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://137.184.1.116:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.7-n-7542157996&limit=500&resourceVersion=0\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:48:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.990000 audit: BPF prog-id=61 op=LOAD May 10 00:48:59.991000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.991000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1634 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:59.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036353937303064343966633365633633323639316539663939643938 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1634 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:59.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036353937303064343966633365633633323639316539663939643938 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.992000 audit: BPF prog-id=62 op=LOAD May 10 00:48:59.992000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c00031c740 items=0 ppid=1634 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:59.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036353937303064343966633365633633323639316539663939643938 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.994000 audit: BPF prog-id=63 op=LOAD May 10 00:48:59.994000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c00031c788 items=0 ppid=1634 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:59.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036353937303064343966633365633633323639316539663939643938 May 10 00:48:59.995000 audit: BPF prog-id=63 op=UNLOAD May 10 00:48:59.995000 audit: BPF prog-id=62 op=UNLOAD May 10 00:48:59.995000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { perfmon } for pid=1649 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit[1649]: AVC avc: denied { bpf } for pid=1649 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:48:59.995000 audit: BPF prog-id=64 op=LOAD May 10 00:48:59.995000 audit[1649]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c00031cb98 items=0 ppid=1634 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:48:59.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036353937303064343966633365633633323639316539663939643938 May 10 00:49:00.017731 systemd[1]: Started cri-containerd-f3a57c73457bf30a8b05234b3bbe2aafee12d1528105101a25f8cc16663632e9.scope. May 10 00:49:00.044721 systemd[1]: Started cri-containerd-34b8a513d9b647ecaf526ac9e8e2c0d3ba053bbedae6fe75641bee0aa4c51d66.scope. May 10 00:49:00.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.059000 audit: BPF prog-id=65 op=LOAD May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=1654 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613537633733343537626633306138623035323334623362626532 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=1654 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613537633733343537626633306138623035323334623362626532 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit: BPF prog-id=66 op=LOAD May 10 00:49:00.060000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001199d8 a2=78 a3=c0002812a0 items=0 ppid=1654 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613537633733343537626633306138623035323334623362626532 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit: BPF prog-id=67 op=LOAD May 10 00:49:00.060000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000119770 a2=78 a3=c0002812e8 items=0 ppid=1654 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613537633733343537626633306138623035323334623362626532 May 10 00:49:00.060000 audit: BPF prog-id=67 op=UNLOAD May 10 00:49:00.060000 audit: BPF prog-id=66 op=UNLOAD May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { perfmon } for pid=1687 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit[1687]: AVC avc: denied { bpf } for pid=1687 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.060000 audit: BPF prog-id=68 op=LOAD May 10 00:49:00.060000 audit[1687]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000119c30 a2=78 a3=c0002816f8 items=0 ppid=1654 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.060000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633613537633733343537626633306138623035323334623362626532 May 10 00:49:00.089846 env[1186]: time="2025-05-10T00:49:00.089757406Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.7-n-7542157996,Uid:8a7ea7eff628f3100173972586061e78,Namespace:kube-system,Attempt:0,} returns sandbox id \"0659700d49fc3ec632691e9f99d98e64655ba9c403fd9780fcad313a7615e2b4\"" May 10 00:49:00.092843 kubelet[1593]: E0510 00:49:00.092441 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:00.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.099000 audit: BPF prog-id=69 op=LOAD May 10 00:49:00.100000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.100000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1673 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623861353133643962363437656361663532366163396538653263 May 10 00:49:00.100000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.100000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1673 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.100000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623861353133643962363437656361663532366163396538653263 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit: BPF prog-id=70 op=LOAD May 10 00:49:00.101000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000389040 items=0 ppid=1673 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623861353133643962363437656361663532366163396538653263 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit: BPF prog-id=71 op=LOAD May 10 00:49:00.101000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000389088 items=0 ppid=1673 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623861353133643962363437656361663532366163396538653263 May 10 00:49:00.101000 audit: BPF prog-id=71 op=UNLOAD May 10 00:49:00.101000 audit: BPF prog-id=70 op=UNLOAD May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { perfmon } for pid=1707 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit[1707]: AVC avc: denied { bpf } for pid=1707 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.101000 audit: BPF prog-id=72 op=LOAD May 10 00:49:00.101000 audit[1707]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000389498 items=0 ppid=1673 pid=1707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334623861353133643962363437656361663532366163396538653263 May 10 00:49:00.111837 env[1186]: time="2025-05-10T00:49:00.111771513Z" level=info msg="CreateContainer within sandbox \"0659700d49fc3ec632691e9f99d98e64655ba9c403fd9780fcad313a7615e2b4\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:49:00.140310 env[1186]: time="2025-05-10T00:49:00.140190793Z" level=info msg="CreateContainer within sandbox \"0659700d49fc3ec632691e9f99d98e64655ba9c403fd9780fcad313a7615e2b4\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8cf96690c521f881d1fccd229392b82dd931f9e5cef6335950e3bf99a0bf42ec\"" May 10 00:49:00.141364 env[1186]: time="2025-05-10T00:49:00.141304128Z" level=info msg="StartContainer for \"8cf96690c521f881d1fccd229392b82dd931f9e5cef6335950e3bf99a0bf42ec\"" May 10 00:49:00.156895 env[1186]: time="2025-05-10T00:49:00.156822997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.7-n-7542157996,Uid:61661591a1b375a8d43267c92f66d598,Namespace:kube-system,Attempt:0,} returns sandbox id \"34b8a513d9b647ecaf526ac9e8e2c0d3ba053bbedae6fe75641bee0aa4c51d66\"" May 10 00:49:00.158429 kubelet[1593]: E0510 00:49:00.157985 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:00.161499 env[1186]: time="2025-05-10T00:49:00.161436042Z" level=info msg="CreateContainer within sandbox \"34b8a513d9b647ecaf526ac9e8e2c0d3ba053bbedae6fe75641bee0aa4c51d66\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:49:00.166268 env[1186]: time="2025-05-10T00:49:00.166168489Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.7-n-7542157996,Uid:3260a769d378dc89a49b1053255350a0,Namespace:kube-system,Attempt:0,} returns sandbox id \"f3a57c73457bf30a8b05234b3bbe2aafee12d1528105101a25f8cc16663632e9\"" May 10 00:49:00.173681 kubelet[1593]: E0510 00:49:00.173059 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:00.177783 env[1186]: time="2025-05-10T00:49:00.177728268Z" level=info msg="CreateContainer within sandbox \"f3a57c73457bf30a8b05234b3bbe2aafee12d1528105101a25f8cc16663632e9\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:49:00.182791 env[1186]: time="2025-05-10T00:49:00.182705423Z" level=info msg="CreateContainer within sandbox \"34b8a513d9b647ecaf526ac9e8e2c0d3ba053bbedae6fe75641bee0aa4c51d66\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"9d8ea926bd4e8259d660deb85bd3213ac438b02d71d09bf0404d16ae63214f4f\"" May 10 00:49:00.184388 env[1186]: time="2025-05-10T00:49:00.184325888Z" level=info msg="StartContainer for \"9d8ea926bd4e8259d660deb85bd3213ac438b02d71d09bf0404d16ae63214f4f\"" May 10 00:49:00.194326 env[1186]: time="2025-05-10T00:49:00.194257876Z" level=info msg="CreateContainer within sandbox \"f3a57c73457bf30a8b05234b3bbe2aafee12d1528105101a25f8cc16663632e9\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"504172bcdaf36ef3c712b4e74dfd2f35d6014dc88404dfb514f3a69c988c18e3\"" May 10 00:49:00.195408 env[1186]: time="2025-05-10T00:49:00.195364725Z" level=info msg="StartContainer for \"504172bcdaf36ef3c712b4e74dfd2f35d6014dc88404dfb514f3a69c988c18e3\"" May 10 00:49:00.199963 systemd[1]: Started cri-containerd-8cf96690c521f881d1fccd229392b82dd931f9e5cef6335950e3bf99a0bf42ec.scope. May 10 00:49:00.243694 systemd[1]: Started cri-containerd-9d8ea926bd4e8259d660deb85bd3213ac438b02d71d09bf0404d16ae63214f4f.scope. May 10 00:49:00.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.252000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.252000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.253000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.253000 audit: BPF prog-id=73 op=LOAD May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1634 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663936363930633532316638383164316663636432323933393262 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1634 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663936363930633532316638383164316663636432323933393262 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit: BPF prog-id=74 op=LOAD May 10 00:49:00.254000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028eac0 items=0 ppid=1634 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663936363930633532316638383164316663636432323933393262 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit: BPF prog-id=75 op=LOAD May 10 00:49:00.254000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028eb08 items=0 ppid=1634 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663936363930633532316638383164316663636432323933393262 May 10 00:49:00.254000 audit: BPF prog-id=75 op=UNLOAD May 10 00:49:00.254000 audit: BPF prog-id=74 op=UNLOAD May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { perfmon } for pid=1763 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit[1763]: AVC avc: denied { bpf } for pid=1763 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.254000 audit: BPF prog-id=76 op=LOAD May 10 00:49:00.254000 audit[1763]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028ef18 items=0 ppid=1634 pid=1763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863663936363930633532316638383164316663636432323933393262 May 10 00:49:00.277529 systemd[1]: Started cri-containerd-504172bcdaf36ef3c712b4e74dfd2f35d6014dc88404dfb514f3a69c988c18e3.scope. May 10 00:49:00.279078 kubelet[1593]: W0510 00:49:00.278740 1593 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://137.184.1.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 137.184.1.116:6443: connect: connection refused May 10 00:49:00.279078 kubelet[1593]: E0510 00:49:00.278826 1593 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://137.184.1.116:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:49:00.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.285000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.286000 audit: BPF prog-id=77 op=LOAD May 10 00:49:00.287000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.287000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1673 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.287000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964386561393236626434653832353964363630646562383562643332 May 10 00:49:00.288000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.288000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1673 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.288000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964386561393236626434653832353964363630646562383562643332 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.289000 audit: BPF prog-id=78 op=LOAD May 10 00:49:00.289000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a8a80 items=0 ppid=1673 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964386561393236626434653832353964363630646562383562643332 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.292000 audit: BPF prog-id=79 op=LOAD May 10 00:49:00.292000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a8ac8 items=0 ppid=1673 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964386561393236626434653832353964363630646562383562643332 May 10 00:49:00.294000 audit: BPF prog-id=79 op=UNLOAD May 10 00:49:00.294000 audit: BPF prog-id=78 op=UNLOAD May 10 00:49:00.294000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { perfmon } for pid=1789 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit[1789]: AVC avc: denied { bpf } for pid=1789 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.294000 audit: BPF prog-id=80 op=LOAD May 10 00:49:00.294000 audit[1789]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a8ed8 items=0 ppid=1673 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3964386561393236626434653832353964363630646562383562643332 May 10 00:49:00.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.310000 audit: BPF prog-id=81 op=LOAD May 10 00:49:00.324987 kubelet[1593]: E0510 00:49:00.324912 1593 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://137.184.1.116:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.7-n-7542157996?timeout=10s\": dial tcp 137.184.1.116:6443: connect: connection refused" interval="1.6s" May 10 00:49:00.323000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1654 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343137326263646166333665663363373132623465373464666432 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1654 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343137326263646166333665663363373132623465373464666432 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.323000 audit: BPF prog-id=82 op=LOAD May 10 00:49:00.323000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219380 items=0 ppid=1654 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343137326263646166333665663363373132623465373464666432 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit: BPF prog-id=83 op=LOAD May 10 00:49:00.324000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002193c8 items=0 ppid=1654 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343137326263646166333665663363373132623465373464666432 May 10 00:49:00.324000 audit: BPF prog-id=83 op=UNLOAD May 10 00:49:00.324000 audit: BPF prog-id=82 op=UNLOAD May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { perfmon } for pid=1788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit[1788]: AVC avc: denied { bpf } for pid=1788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:00.324000 audit: BPF prog-id=84 op=LOAD May 10 00:49:00.324000 audit[1788]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002197d8 items=0 ppid=1654 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:00.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530343137326263646166333665663363373132623465373464666432 May 10 00:49:00.342307 env[1186]: time="2025-05-10T00:49:00.340372776Z" level=info msg="StartContainer for \"8cf96690c521f881d1fccd229392b82dd931f9e5cef6335950e3bf99a0bf42ec\" returns successfully" May 10 00:49:00.401201 env[1186]: time="2025-05-10T00:49:00.401123676Z" level=info msg="StartContainer for \"504172bcdaf36ef3c712b4e74dfd2f35d6014dc88404dfb514f3a69c988c18e3\" returns successfully" May 10 00:49:00.408996 env[1186]: time="2025-05-10T00:49:00.408788287Z" level=info msg="StartContainer for \"9d8ea926bd4e8259d660deb85bd3213ac438b02d71d09bf0404d16ae63214f4f\" returns successfully" May 10 00:49:00.449342 kubelet[1593]: W0510 00:49:00.449147 1593 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://137.184.1.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 137.184.1.116:6443: connect: connection refused May 10 00:49:00.449342 kubelet[1593]: E0510 00:49:00.449284 1593 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://137.184.1.116:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:49:00.480172 kubelet[1593]: W0510 00:49:00.479937 1593 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://137.184.1.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 137.184.1.116:6443: connect: connection refused May 10 00:49:00.480172 kubelet[1593]: E0510 00:49:00.480020 1593 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://137.184.1.116:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 137.184.1.116:6443: connect: connection refused" logger="UnhandledError" May 10 00:49:00.496421 kubelet[1593]: I0510 00:49:00.496379 1593 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-7542157996" May 10 00:49:00.497143 kubelet[1593]: E0510 00:49:00.497088 1593 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://137.184.1.116:6443/api/v1/nodes\": dial tcp 137.184.1.116:6443: connect: connection refused" node="ci-3510.3.7-n-7542157996" May 10 00:49:00.649633 sshd[1511]: Failed password for root from 218.92.0.154 port 45543 ssh2 May 10 00:49:00.984743 kubelet[1593]: E0510 00:49:00.984700 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:00.987619 kubelet[1593]: E0510 00:49:00.987581 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:00.993014 kubelet[1593]: E0510 00:49:00.992961 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:01.494000 audit[1511]: USER_AUTH pid=1511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.154 addr=218.92.0.154 terminal=ssh res=failed' May 10 00:49:01.993330 kubelet[1593]: E0510 00:49:01.993286 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:02.054000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:02.054000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000355bc0 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:49:02.054000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:49:02.057000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:02.057000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00042b800 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:49:02.057000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:49:02.099634 kubelet[1593]: I0510 00:49:02.099584 1593 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-7542157996" May 10 00:49:03.036775 kernel: kauditd_printk_skb: 622 callbacks suppressed May 10 00:49:03.037147 kernel: audit: type=1400 audit(1746838143.031:551): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.031000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.031000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00399a8a0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.031000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.047027 kernel: audit: type=1300 audit(1746838143.031:551): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00399a8a0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.047273 kernel: audit: type=1327 audit(1746838143.031:551): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.047319 kernel: audit: type=1400 audit(1746838143.031:552): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.031000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.050267 kernel: audit: type=1300 audit(1746838143.031:552): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003ffcd20 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.031000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003ffcd20 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.031000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.031000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526364 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.066339 kernel: audit: type=1327 audit(1746838143.031:552): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.066540 kernel: audit: type=1400 audit(1746838143.031:553): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526364 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.066588 kernel: audit: type=1300 audit(1746838143.031:553): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00399a9f0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.031000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00399a9f0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.031000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.056000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526370 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.081985 kernel: audit: type=1327 audit(1746838143.031:553): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.082201 kernel: audit: type=1400 audit(1746838143.056:554): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526370 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.056000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c003b0cdb0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.056000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.094000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.094000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c003ffdae0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.094000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:03.094000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=65 a1=c006ccecf0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:49:03.094000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:49:03.219479 kubelet[1593]: E0510 00:49:03.219419 1593 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.7-n-7542157996\" not found" node="ci-3510.3.7-n-7542157996" May 10 00:49:03.294444 kubelet[1593]: I0510 00:49:03.294287 1593 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-n-7542157996" May 10 00:49:03.294444 kubelet[1593]: E0510 00:49:03.294360 1593 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ci-3510.3.7-n-7542157996\": node \"ci-3510.3.7-n-7542157996\" not found" May 10 00:49:03.481491 sshd[1511]: Failed password for root from 218.92.0.154 port 45543 ssh2 May 10 00:49:03.780705 kubelet[1593]: E0510 00:49:03.780657 1593 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.7-n-7542157996\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:49:03.781115 kubelet[1593]: E0510 00:49:03.781093 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:03.885087 kubelet[1593]: I0510 00:49:03.884985 1593 apiserver.go:52] "Watching apiserver" May 10 00:49:03.920503 kubelet[1593]: I0510 00:49:03.920389 1593 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 00:49:04.213442 kubelet[1593]: W0510 00:49:04.213327 1593 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:49:04.213981 kubelet[1593]: E0510 00:49:04.213960 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:04.581000 audit[1511]: USER_AUTH pid=1511 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.154 addr=218.92.0.154 terminal=ssh res=failed' May 10 00:49:04.997699 kubelet[1593]: E0510 00:49:04.997666 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:05.630532 systemd[1]: Reloading. May 10 00:49:05.749851 /usr/lib/systemd/system-generators/torcx-generator[1893]: time="2025-05-10T00:49:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:49:05.750523 /usr/lib/systemd/system-generators/torcx-generator[1893]: time="2025-05-10T00:49:05Z" level=info msg="torcx already run" May 10 00:49:05.878778 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:49:05.878805 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:49:05.909481 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:49:05.943298 kubelet[1593]: W0510 00:49:05.943252 1593 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:49:05.943812 kubelet[1593]: E0510 00:49:05.943786 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:05.981035 sshd[1511]: Failed password for root from 218.92.0.154 port 45543 ssh2 May 10 00:49:05.999334 kubelet[1593]: E0510 00:49:05.999300 1593 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:06.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.017000 audit: BPF prog-id=85 op=LOAD May 10 00:49:06.017000 audit: BPF prog-id=46 op=UNLOAD May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit: BPF prog-id=86 op=LOAD May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit: BPF prog-id=87 op=LOAD May 10 00:49:06.019000 audit: BPF prog-id=47 op=UNLOAD May 10 00:49:06.019000 audit: BPF prog-id=48 op=UNLOAD May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit: BPF prog-id=88 op=LOAD May 10 00:49:06.020000 audit: BPF prog-id=49 op=UNLOAD May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit: BPF prog-id=89 op=LOAD May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.020000 audit: BPF prog-id=90 op=LOAD May 10 00:49:06.020000 audit: BPF prog-id=50 op=UNLOAD May 10 00:49:06.020000 audit: BPF prog-id=51 op=UNLOAD May 10 00:49:06.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit: BPF prog-id=91 op=LOAD May 10 00:49:06.022000 audit: BPF prog-id=52 op=UNLOAD May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit: BPF prog-id=92 op=LOAD May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.022000 audit: BPF prog-id=93 op=LOAD May 10 00:49:06.023000 audit: BPF prog-id=53 op=UNLOAD May 10 00:49:06.023000 audit: BPF prog-id=54 op=UNLOAD May 10 00:49:06.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.024000 audit: BPF prog-id=94 op=LOAD May 10 00:49:06.024000 audit: BPF prog-id=55 op=UNLOAD May 10 00:49:06.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.025000 audit: BPF prog-id=95 op=LOAD May 10 00:49:06.025000 audit: BPF prog-id=81 op=UNLOAD May 10 00:49:06.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.026000 audit: BPF prog-id=96 op=LOAD May 10 00:49:06.026000 audit: BPF prog-id=77 op=UNLOAD May 10 00:49:06.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.027000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit: BPF prog-id=97 op=LOAD May 10 00:49:06.028000 audit: BPF prog-id=65 op=UNLOAD May 10 00:49:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.028000 audit: BPF prog-id=98 op=LOAD May 10 00:49:06.028000 audit: BPF prog-id=56 op=UNLOAD May 10 00:49:06.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.029000 audit: BPF prog-id=99 op=LOAD May 10 00:49:06.029000 audit: BPF prog-id=73 op=UNLOAD May 10 00:49:06.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.031000 audit: BPF prog-id=100 op=LOAD May 10 00:49:06.031000 audit: BPF prog-id=61 op=UNLOAD May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit: BPF prog-id=101 op=LOAD May 10 00:49:06.036000 audit: BPF prog-id=69 op=UNLOAD May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.036000 audit: BPF prog-id=102 op=LOAD May 10 00:49:06.036000 audit: BPF prog-id=57 op=UNLOAD May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit: BPF prog-id=103 op=LOAD May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit: BPF prog-id=104 op=LOAD May 10 00:49:06.037000 audit: BPF prog-id=58 op=UNLOAD May 10 00:49:06.037000 audit: BPF prog-id=59 op=UNLOAD May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:06.037000 audit: BPF prog-id=105 op=LOAD May 10 00:49:06.037000 audit: BPF prog-id=60 op=UNLOAD May 10 00:49:06.064852 kubelet[1593]: I0510 00:49:06.061850 1593 dynamic_cafile_content.go:174] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:49:06.065389 systemd[1]: Stopping kubelet.service... May 10 00:49:06.086869 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:49:06.087192 systemd[1]: Stopped kubelet.service. May 10 00:49:06.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.087338 systemd[1]: kubelet.service: Consumed 1.180s CPU time. May 10 00:49:06.090906 systemd[1]: Starting kubelet.service... May 10 00:49:06.194582 sshd[1511]: Received disconnect from 218.92.0.154 port 45543:11: [preauth] May 10 00:49:06.194582 sshd[1511]: Disconnected from authenticating user root 218.92.0.154 port 45543 [preauth] May 10 00:49:06.195767 sshd[1511]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154 user=root May 10 00:49:06.196951 systemd[1]: sshd@7-137.184.1.116:22-218.92.0.154:45543.service: Deactivated successfully. May 10 00:49:06.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-137.184.1.116:22-218.92.0.154:45543 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:06.829000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=526395 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:49:06.829000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0005a7140 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:49:06.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:49:07.159991 systemd[1]: Started kubelet.service. May 10 00:49:07.159000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:07.298679 kubelet[1942]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:49:07.298679 kubelet[1942]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:49:07.298679 kubelet[1942]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:49:07.298679 kubelet[1942]: I0510 00:49:07.298232 1942 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:49:07.320370 kubelet[1942]: I0510 00:49:07.319725 1942 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 10 00:49:07.320370 kubelet[1942]: I0510 00:49:07.319773 1942 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:49:07.320668 kubelet[1942]: I0510 00:49:07.320584 1942 server.go:929] "Client rotation is on, will bootstrap in background" May 10 00:49:07.327007 kubelet[1942]: I0510 00:49:07.326950 1942 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:49:07.359408 kubelet[1942]: I0510 00:49:07.358876 1942 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:49:07.365828 kubelet[1942]: E0510 00:49:07.365772 1942 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 10 00:49:07.365828 kubelet[1942]: I0510 00:49:07.365823 1942 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 10 00:49:07.370290 kubelet[1942]: I0510 00:49:07.370234 1942 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:49:07.378893 kubelet[1942]: I0510 00:49:07.378837 1942 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 10 00:49:07.379503 kubelet[1942]: I0510 00:49:07.379431 1942 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:49:07.379848 kubelet[1942]: I0510 00:49:07.379638 1942 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.7-n-7542157996","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 10 00:49:07.380040 kubelet[1942]: I0510 00:49:07.379995 1942 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:49:07.380109 kubelet[1942]: I0510 00:49:07.380099 1942 container_manager_linux.go:300] "Creating device plugin manager" May 10 00:49:07.380267 kubelet[1942]: I0510 00:49:07.380253 1942 state_mem.go:36] "Initialized new in-memory state store" May 10 00:49:07.380558 kubelet[1942]: I0510 00:49:07.380546 1942 kubelet.go:408] "Attempting to sync node with API server" May 10 00:49:07.381868 kubelet[1942]: I0510 00:49:07.381848 1942 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:49:07.382109 kubelet[1942]: I0510 00:49:07.382096 1942 kubelet.go:314] "Adding apiserver pod source" May 10 00:49:07.392625 kubelet[1942]: I0510 00:49:07.392591 1942 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:49:07.396769 kubelet[1942]: I0510 00:49:07.396725 1942 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:49:07.396000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:07.396000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cc8100 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:49:07.396000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:49:07.396000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:07.396000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cc8120 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:49:07.396000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:49:07.397000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:07.397000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cc82c0 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:49:07.397000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:49:07.397000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:49:07.397000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cc82e0 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:49:07.397000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:49:07.409441 kubelet[1942]: I0510 00:49:07.409286 1942 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:49:07.410441 kubelet[1942]: I0510 00:49:07.410333 1942 server.go:1269] "Started kubelet" May 10 00:49:07.414000 audit[1942]: AVC avc: denied { mac_admin } for pid=1942 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:07.414000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:07.414000 audit[1942]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bf45d0 a1=c000b6d7a0 a2=c000bf45a0 a3=25 items=0 ppid=1 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:07.414000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:07.416389 kubelet[1942]: I0510 00:49:07.416358 1942 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:49:07.415000 audit[1942]: AVC avc: denied { mac_admin } for pid=1942 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:07.415000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:07.415000 audit[1942]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b79540 a1=c000b6d7b8 a2=c000bf4660 a3=25 items=0 ppid=1 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:07.415000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:07.416708 kubelet[1942]: I0510 00:49:07.416691 1942 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:49:07.416801 kubelet[1942]: I0510 00:49:07.416790 1942 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:49:07.417728 kubelet[1942]: I0510 00:49:07.417690 1942 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:49:07.423645 kubelet[1942]: I0510 00:49:07.423606 1942 server.go:460] "Adding debug handlers to kubelet server" May 10 00:49:07.425235 kubelet[1942]: I0510 00:49:07.420501 1942 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 10 00:49:07.426835 kubelet[1942]: I0510 00:49:07.417871 1942 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:49:07.427539 kubelet[1942]: I0510 00:49:07.427211 1942 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:49:07.431148 kubelet[1942]: I0510 00:49:07.431114 1942 factory.go:221] Registration of the systemd container factory successfully May 10 00:49:07.431579 kubelet[1942]: I0510 00:49:07.431556 1942 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:49:07.432170 kubelet[1942]: I0510 00:49:07.432136 1942 volume_manager.go:289] "Starting Kubelet Volume Manager" May 10 00:49:07.434128 kubelet[1942]: I0510 00:49:07.433806 1942 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 10 00:49:07.436409 kubelet[1942]: I0510 00:49:07.436371 1942 reconciler.go:26] "Reconciler: start to sync state" May 10 00:49:07.450837 kubelet[1942]: E0510 00:49:07.450795 1942 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:49:07.456997 kubelet[1942]: I0510 00:49:07.456955 1942 factory.go:221] Registration of the containerd container factory successfully May 10 00:49:07.504779 kubelet[1942]: I0510 00:49:07.504734 1942 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:49:07.507578 kubelet[1942]: I0510 00:49:07.507537 1942 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:49:07.507843 kubelet[1942]: I0510 00:49:07.507824 1942 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:49:07.507962 kubelet[1942]: I0510 00:49:07.507950 1942 kubelet.go:2321] "Starting kubelet main sync loop" May 10 00:49:07.508222 kubelet[1942]: E0510 00:49:07.508137 1942 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:49:07.553125 kubelet[1942]: I0510 00:49:07.553092 1942 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:49:07.553384 kubelet[1942]: I0510 00:49:07.553363 1942 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:49:07.553503 kubelet[1942]: I0510 00:49:07.553492 1942 state_mem.go:36] "Initialized new in-memory state store" May 10 00:49:07.553799 kubelet[1942]: I0510 00:49:07.553778 1942 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:49:07.553923 kubelet[1942]: I0510 00:49:07.553876 1942 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:49:07.554021 kubelet[1942]: I0510 00:49:07.554006 1942 policy_none.go:49] "None policy: Start" May 10 00:49:07.560807 kubelet[1942]: I0510 00:49:07.560762 1942 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:49:07.561124 kubelet[1942]: I0510 00:49:07.561099 1942 state_mem.go:35] "Initializing new in-memory state store" May 10 00:49:07.561821 kubelet[1942]: I0510 00:49:07.561784 1942 state_mem.go:75] "Updated machine memory state" May 10 00:49:07.576632 kubelet[1942]: I0510 00:49:07.576597 1942 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:49:07.577136 kubelet[1942]: I0510 00:49:07.577043 1942 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:49:07.575000 audit[1942]: AVC avc: denied { mac_admin } for pid=1942 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:07.575000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:49:07.575000 audit[1942]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fd32c0 a1=c000b6c3d8 a2=c000fd3290 a3=25 items=0 ppid=1 pid=1942 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:07.575000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:49:07.578069 kubelet[1942]: I0510 00:49:07.578053 1942 eviction_manager.go:189] "Eviction manager: starting control loop" May 10 00:49:07.578221 kubelet[1942]: I0510 00:49:07.578179 1942 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:49:07.579430 kubelet[1942]: I0510 00:49:07.579407 1942 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:49:07.622392 kubelet[1942]: W0510 00:49:07.622346 1942 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:49:07.622561 kubelet[1942]: E0510 00:49:07.622449 1942 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.7-n-7542157996\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.7-n-7542157996" May 10 00:49:07.622616 kubelet[1942]: W0510 00:49:07.622567 1942 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:49:07.622655 kubelet[1942]: E0510 00:49:07.622624 1942 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-n-7542157996\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" May 10 00:49:07.622737 kubelet[1942]: W0510 00:49:07.622716 1942 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:49:07.637182 kubelet[1942]: I0510 00:49:07.637128 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:49:07.637564 kubelet[1942]: I0510 00:49:07.637541 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:49:07.637716 kubelet[1942]: I0510 00:49:07.637700 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/61661591a1b375a8d43267c92f66d598-kubeconfig\") pod \"kube-scheduler-ci-3510.3.7-n-7542157996\" (UID: \"61661591a1b375a8d43267c92f66d598\") " pod="kube-system/kube-scheduler-ci-3510.3.7-n-7542157996" May 10 00:49:07.637903 kubelet[1942]: I0510 00:49:07.637883 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/8a7ea7eff628f3100173972586061e78-ca-certs\") pod \"kube-apiserver-ci-3510.3.7-n-7542157996\" (UID: \"8a7ea7eff628f3100173972586061e78\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" May 10 00:49:07.638052 kubelet[1942]: I0510 00:49:07.638037 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/8a7ea7eff628f3100173972586061e78-k8s-certs\") pod \"kube-apiserver-ci-3510.3.7-n-7542157996\" (UID: \"8a7ea7eff628f3100173972586061e78\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" May 10 00:49:07.638165 kubelet[1942]: I0510 00:49:07.638149 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/8a7ea7eff628f3100173972586061e78-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.7-n-7542157996\" (UID: \"8a7ea7eff628f3100173972586061e78\") " pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" May 10 00:49:07.638310 kubelet[1942]: I0510 00:49:07.638295 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-ca-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:49:07.638466 kubelet[1942]: I0510 00:49:07.638446 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:49:07.638678 kubelet[1942]: I0510 00:49:07.638655 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/3260a769d378dc89a49b1053255350a0-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.7-n-7542157996\" (UID: \"3260a769d378dc89a49b1053255350a0\") " pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" May 10 00:49:07.691443 kubelet[1942]: I0510 00:49:07.691284 1942 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.7-n-7542157996" May 10 00:49:07.705337 kubelet[1942]: I0510 00:49:07.705264 1942 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.7-n-7542157996" May 10 00:49:07.705801 kubelet[1942]: I0510 00:49:07.705770 1942 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.7-n-7542157996" May 10 00:49:07.923646 kubelet[1942]: E0510 00:49:07.923590 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:07.923908 kubelet[1942]: E0510 00:49:07.923600 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:07.924170 kubelet[1942]: E0510 00:49:07.924137 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:08.394018 kubelet[1942]: I0510 00:49:08.393728 1942 apiserver.go:52] "Watching apiserver" May 10 00:49:08.435031 kubelet[1942]: I0510 00:49:08.434978 1942 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 10 00:49:08.571806 kubelet[1942]: E0510 00:49:08.571763 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:08.572772 kubelet[1942]: E0510 00:49:08.572733 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:08.631100 kubelet[1942]: I0510 00:49:08.631009 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.7-n-7542157996" podStartSLOduration=4.630979214 podStartE2EDuration="4.630979214s" podCreationTimestamp="2025-05-10 00:49:04 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:08.537794031 +0000 UTC m=+1.353367167" watchObservedRunningTime="2025-05-10 00:49:08.630979214 +0000 UTC m=+1.446552348" May 10 00:49:08.652711 kubelet[1942]: W0510 00:49:08.652561 1942 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 00:49:08.653258 kubelet[1942]: E0510 00:49:08.653203 1942 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.7-n-7542157996\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" May 10 00:49:08.653715 kubelet[1942]: E0510 00:49:08.653685 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:08.686218 kubelet[1942]: I0510 00:49:08.686134 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.7-n-7542157996" podStartSLOduration=3.686104215 podStartE2EDuration="3.686104215s" podCreationTimestamp="2025-05-10 00:49:05 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:08.635481302 +0000 UTC m=+1.451054429" watchObservedRunningTime="2025-05-10 00:49:08.686104215 +0000 UTC m=+1.501677355" May 10 00:49:08.723133 kubelet[1942]: I0510 00:49:08.723038 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.7-n-7542157996" podStartSLOduration=1.7230105199999999 podStartE2EDuration="1.72301052s" podCreationTimestamp="2025-05-10 00:49:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:08.686875396 +0000 UTC m=+1.502448523" watchObservedRunningTime="2025-05-10 00:49:08.72301052 +0000 UTC m=+1.538583659" May 10 00:49:09.574475 kubelet[1942]: E0510 00:49:09.574422 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:09.575479 kubelet[1942]: E0510 00:49:09.575433 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:11.425772 kubelet[1942]: I0510 00:49:11.425726 1942 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:49:11.427024 env[1186]: time="2025-05-10T00:49:11.426958172Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:49:11.427869 kubelet[1942]: I0510 00:49:11.427839 1942 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:49:11.801152 kubelet[1942]: E0510 00:49:11.801088 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:12.287503 systemd[1]: Created slice kubepods-besteffort-pod084e48ea_724a_4b0a_89ff_7285c10ea042.slice. May 10 00:49:12.368678 kubelet[1942]: I0510 00:49:12.368622 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/084e48ea-724a-4b0a-89ff-7285c10ea042-kube-proxy\") pod \"kube-proxy-f62zc\" (UID: \"084e48ea-724a-4b0a-89ff-7285c10ea042\") " pod="kube-system/kube-proxy-f62zc" May 10 00:49:12.369040 kubelet[1942]: I0510 00:49:12.369013 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/084e48ea-724a-4b0a-89ff-7285c10ea042-lib-modules\") pod \"kube-proxy-f62zc\" (UID: \"084e48ea-724a-4b0a-89ff-7285c10ea042\") " pod="kube-system/kube-proxy-f62zc" May 10 00:49:12.369302 kubelet[1942]: I0510 00:49:12.369199 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6v6bd\" (UniqueName: \"kubernetes.io/projected/084e48ea-724a-4b0a-89ff-7285c10ea042-kube-api-access-6v6bd\") pod \"kube-proxy-f62zc\" (UID: \"084e48ea-724a-4b0a-89ff-7285c10ea042\") " pod="kube-system/kube-proxy-f62zc" May 10 00:49:12.369563 kubelet[1942]: I0510 00:49:12.369533 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/084e48ea-724a-4b0a-89ff-7285c10ea042-xtables-lock\") pod \"kube-proxy-f62zc\" (UID: \"084e48ea-724a-4b0a-89ff-7285c10ea042\") " pod="kube-system/kube-proxy-f62zc" May 10 00:49:12.485254 kubelet[1942]: I0510 00:49:12.485186 1942 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 10 00:49:12.588319 systemd[1]: Created slice kubepods-besteffort-pod6c57e73d_600e_4f09_9913_63dc1b98623c.slice. May 10 00:49:12.591865 kubelet[1942]: E0510 00:49:12.591833 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:12.598991 kubelet[1942]: E0510 00:49:12.598952 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:12.600384 env[1186]: time="2025-05-10T00:49:12.600196190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-f62zc,Uid:084e48ea-724a-4b0a-89ff-7285c10ea042,Namespace:kube-system,Attempt:0,}" May 10 00:49:12.630327 env[1186]: time="2025-05-10T00:49:12.629405531Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:12.630327 env[1186]: time="2025-05-10T00:49:12.629478923Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:12.630327 env[1186]: time="2025-05-10T00:49:12.629494367Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:12.630327 env[1186]: time="2025-05-10T00:49:12.630000722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6a97abc2fc269d974c25213a0e5c8edd1768d9648feeb849d7b3bd14f0d578e pid=2010 runtime=io.containerd.runc.v2 May 10 00:49:12.664433 systemd[1]: run-containerd-runc-k8s.io-a6a97abc2fc269d974c25213a0e5c8edd1768d9648feeb849d7b3bd14f0d578e-runc.9POG6d.mount: Deactivated successfully. May 10 00:49:12.671389 systemd[1]: Started cri-containerd-a6a97abc2fc269d974c25213a0e5c8edd1768d9648feeb849d7b3bd14f0d578e.scope. May 10 00:49:12.672783 kubelet[1942]: I0510 00:49:12.671967 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dtqt6\" (UniqueName: \"kubernetes.io/projected/6c57e73d-600e-4f09-9913-63dc1b98623c-kube-api-access-dtqt6\") pod \"tigera-operator-6f6897fdc5-kg29g\" (UID: \"6c57e73d-600e-4f09-9913-63dc1b98623c\") " pod="tigera-operator/tigera-operator-6f6897fdc5-kg29g" May 10 00:49:12.672783 kubelet[1942]: I0510 00:49:12.672022 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6c57e73d-600e-4f09-9913-63dc1b98623c-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-kg29g\" (UID: \"6c57e73d-600e-4f09-9913-63dc1b98623c\") " pod="tigera-operator/tigera-operator-6f6897fdc5-kg29g" May 10 00:49:12.701596 kernel: kauditd_printk_skb: 283 callbacks suppressed May 10 00:49:12.701903 kernel: audit: type=1400 audit(1746838152.696:813): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.701970 kernel: audit: type=1400 audit(1746838152.696:814): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.707861 kernel: audit: type=1400 audit(1746838152.697:815): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.708001 kernel: audit: type=1400 audit(1746838152.697:816): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.714061 kernel: audit: type=1400 audit(1746838152.697:817): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.714210 kernel: audit: type=1400 audit(1746838152.697:818): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.720220 kernel: audit: type=1400 audit(1746838152.697:819): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.720394 kernel: audit: type=1400 audit(1746838152.697:820): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.697000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.723145 kernel: audit: type=1400 audit(1746838152.697:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.697000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.725872 kernel: audit: type=1400 audit(1746838152.699:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.699000 audit: BPF prog-id=106 op=LOAD May 10 00:49:12.702000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2010 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613937616263326663323639643937346332353231336130653563 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2010 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613937616263326663323639643937346332353231336130653563 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.702000 audit: BPF prog-id=107 op=LOAD May 10 00:49:12.702000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00020a360 items=0 ppid=2010 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.702000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613937616263326663323639643937346332353231336130653563 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.703000 audit: BPF prog-id=108 op=LOAD May 10 00:49:12.703000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00020a3a8 items=0 ppid=2010 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.703000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613937616263326663323639643937346332353231336130653563 May 10 00:49:12.713000 audit: BPF prog-id=108 op=UNLOAD May 10 00:49:12.713000 audit: BPF prog-id=107 op=UNLOAD May 10 00:49:12.713000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { perfmon } for pid=2021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit[2021]: AVC avc: denied { bpf } for pid=2021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.713000 audit: BPF prog-id=109 op=LOAD May 10 00:49:12.713000 audit[2021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00020a7b8 items=0 ppid=2010 pid=2021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136613937616263326663323639643937346332353231336130653563 May 10 00:49:12.747446 env[1186]: time="2025-05-10T00:49:12.747382385Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-f62zc,Uid:084e48ea-724a-4b0a-89ff-7285c10ea042,Namespace:kube-system,Attempt:0,} returns sandbox id \"a6a97abc2fc269d974c25213a0e5c8edd1768d9648feeb849d7b3bd14f0d578e\"" May 10 00:49:12.750859 kubelet[1942]: E0510 00:49:12.748800 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:12.754369 env[1186]: time="2025-05-10T00:49:12.754306629Z" level=info msg="CreateContainer within sandbox \"a6a97abc2fc269d974c25213a0e5c8edd1768d9648feeb849d7b3bd14f0d578e\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:49:12.777133 env[1186]: time="2025-05-10T00:49:12.777054053Z" level=info msg="CreateContainer within sandbox \"a6a97abc2fc269d974c25213a0e5c8edd1768d9648feeb849d7b3bd14f0d578e\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"5728a9ab4010cfceb356db23e074d952ec19ddedd2538218a0dcecbff4a2184a\"" May 10 00:49:12.783926 env[1186]: time="2025-05-10T00:49:12.783861223Z" level=info msg="StartContainer for \"5728a9ab4010cfceb356db23e074d952ec19ddedd2538218a0dcecbff4a2184a\"" May 10 00:49:12.811494 systemd[1]: Started cri-containerd-5728a9ab4010cfceb356db23e074d952ec19ddedd2538218a0dcecbff4a2184a.scope. May 10 00:49:12.843000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001cb6b0 a2=3c a3=7f50c9d4ee28 items=0 ppid=2010 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537323861396162343031306366636562333536646232336530373464 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.843000 audit: BPF prog-id=110 op=LOAD May 10 00:49:12.843000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001cb9d8 a2=78 a3=c000132d98 items=0 ppid=2010 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.843000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537323861396162343031306366636562333536646232336530373464 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.848000 audit: BPF prog-id=111 op=LOAD May 10 00:49:12.848000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001cb770 a2=78 a3=c000132de8 items=0 ppid=2010 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537323861396162343031306366636562333536646232336530373464 May 10 00:49:12.849000 audit: BPF prog-id=111 op=UNLOAD May 10 00:49:12.849000 audit: BPF prog-id=110 op=UNLOAD May 10 00:49:12.849000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { perfmon } for pid=2051 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit[2051]: AVC avc: denied { bpf } for pid=2051 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.849000 audit: BPF prog-id=112 op=LOAD May 10 00:49:12.849000 audit[2051]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001cbc30 a2=78 a3=c000132e78 items=0 ppid=2010 pid=2051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537323861396162343031306366636562333536646232336530373464 May 10 00:49:12.876992 env[1186]: time="2025-05-10T00:49:12.876923235Z" level=info msg="StartContainer for \"5728a9ab4010cfceb356db23e074d952ec19ddedd2538218a0dcecbff4a2184a\" returns successfully" May 10 00:49:12.902095 env[1186]: time="2025-05-10T00:49:12.901885205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-kg29g,Uid:6c57e73d-600e-4f09-9913-63dc1b98623c,Namespace:tigera-operator,Attempt:0,}" May 10 00:49:12.930881 env[1186]: time="2025-05-10T00:49:12.930711225Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:12.931424 env[1186]: time="2025-05-10T00:49:12.931342942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:12.931626 env[1186]: time="2025-05-10T00:49:12.931597094Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:12.932125 env[1186]: time="2025-05-10T00:49:12.932056214Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2069edb17058dca33c37630f400995f8294327e868c72491f2c3b0aeba7ceb6e pid=2085 runtime=io.containerd.runc.v2 May 10 00:49:12.966487 systemd[1]: Started cri-containerd-2069edb17058dca33c37630f400995f8294327e868c72491f2c3b0aeba7ceb6e.scope. May 10 00:49:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.990000 audit: BPF prog-id=113 op=LOAD May 10 00:49:12.991000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.991000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2085 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.991000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363965646231373035386463613333633337363330663430303939 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2085 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363965646231373035386463613333633337363330663430303939 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.992000 audit: BPF prog-id=114 op=LOAD May 10 00:49:12.992000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000290a20 items=0 ppid=2085 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363965646231373035386463613333633337363330663430303939 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.993000 audit: BPF prog-id=115 op=LOAD May 10 00:49:12.993000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000290a68 items=0 ppid=2085 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.993000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363965646231373035386463613333633337363330663430303939 May 10 00:49:12.994000 audit: BPF prog-id=115 op=UNLOAD May 10 00:49:12.994000 audit: BPF prog-id=114 op=UNLOAD May 10 00:49:12.994000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:12.994000 audit: BPF prog-id=116 op=LOAD May 10 00:49:12.994000 audit[2096]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000290e78 items=0 ppid=2085 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:12.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3230363965646231373035386463613333633337363330663430303939 May 10 00:49:13.038378 env[1186]: time="2025-05-10T00:49:13.038313694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-kg29g,Uid:6c57e73d-600e-4f09-9913-63dc1b98623c,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"2069edb17058dca33c37630f400995f8294327e868c72491f2c3b0aeba7ceb6e\"" May 10 00:49:13.041002 env[1186]: time="2025-05-10T00:49:13.040823918Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:49:13.265000 audit[2153]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.265000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc9a27df00 a2=0 a3=7ffc9a27deec items=0 ppid=2062 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:49:13.265000 audit[2154]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.265000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc6874f6e0 a2=0 a3=7ffc6874f6cc items=0 ppid=2062 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.265000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:49:13.271000 audit[2155]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2155 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.271000 audit[2155]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffde1adbeb0 a2=0 a3=7ffde1adbe9c items=0 ppid=2062 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:49:13.272000 audit[2156]: NETFILTER_CFG table=mangle:41 family=10 entries=1 op=nft_register_chain pid=2156 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.272000 audit[2156]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffcdb13e60 a2=0 a3=7fffcdb13e4c items=0 ppid=2062 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.272000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:49:13.278000 audit[2157]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2157 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.278000 audit[2157]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd0630450 a2=0 a3=7ffdd063043c items=0 ppid=2062 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:49:13.281000 audit[2158]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2158 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.281000 audit[2158]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffec42d2470 a2=0 a3=7ffec42d245c items=0 ppid=2062 pid=2158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.281000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:49:13.379000 audit[2163]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2163 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.379000 audit[2163]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffc03ee090 a2=0 a3=7fffc03ee07c items=0 ppid=2062 pid=2163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:49:13.387000 audit[2165]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.387000 audit[2165]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fffab472de0 a2=0 a3=7fffab472dcc items=0 ppid=2062 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.387000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:49:13.395000 audit[2168]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2168 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.395000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe54a48e10 a2=0 a3=7ffe54a48dfc items=0 ppid=2062 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:49:13.397000 audit[2169]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.397000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff35f185c0 a2=0 a3=7fff35f185ac items=0 ppid=2062 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:49:13.407000 audit[2171]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.407000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff09488c40 a2=0 a3=7fff09488c2c items=0 ppid=2062 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.407000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:49:13.410000 audit[2173]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.410000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd90eb21f0 a2=0 a3=7ffd90eb21dc items=0 ppid=2062 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:49:13.415000 audit[2175]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.415000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe71231db0 a2=0 a3=7ffe71231d9c items=0 ppid=2062 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:49:13.422000 audit[2178]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.422000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe10e412c0 a2=0 a3=7ffe10e412ac items=0 ppid=2062 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:49:13.425000 audit[2179]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.425000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd7146310 a2=0 a3=7ffcd71462fc items=0 ppid=2062 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.425000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:49:13.431000 audit[2181]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.431000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc57d194c0 a2=0 a3=7ffc57d194ac items=0 ppid=2062 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:49:13.434000 audit[2182]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.434000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe687502b0 a2=0 a3=7ffe6875029c items=0 ppid=2062 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.434000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:49:13.440000 audit[2185]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.440000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffed04d0cc0 a2=0 a3=7ffed04d0cac items=0 ppid=2062 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:49:13.451000 audit[2188]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.451000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffefd0f8d0 a2=0 a3=7fffefd0f8bc items=0 ppid=2062 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:49:13.461000 audit[2191]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.461000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe557e7cf0 a2=0 a3=7ffe557e7cdc items=0 ppid=2062 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.461000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:49:13.464000 audit[2196]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.464000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde544e450 a2=0 a3=7ffde544e43c items=0 ppid=2062 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.464000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:49:13.471000 audit[2198]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.471000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd9276a2f0 a2=0 a3=7ffd9276a2dc items=0 ppid=2062 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:49:13.478000 audit[2201]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.478000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca850e290 a2=0 a3=7ffca850e27c items=0 ppid=2062 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:49:13.480000 audit[2202]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.480000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffec62e600 a2=0 a3=7fffec62e5ec items=0 ppid=2062 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:49:13.486000 audit[2204]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:49:13.486000 audit[2204]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe42606ce0 a2=0 a3=7ffe42606ccc items=0 ppid=2062 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:49:13.570000 audit[2210]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:13.570000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc21f61d80 a2=0 a3=7ffc21f61d6c items=0 ppid=2062 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.570000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:13.587000 audit[2210]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:13.587000 audit[2210]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc21f61d80 a2=0 a3=7ffc21f61d6c items=0 ppid=2062 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:13.597676 kubelet[1942]: E0510 00:49:13.597207 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:13.614000 audit[2220]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.614000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe46081ec0 a2=0 a3=7ffe46081eac items=0 ppid=2062 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.614000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:49:13.617633 sudo[1332]: pam_unix(sudo:session): session closed for user root May 10 00:49:13.616000 audit[1332]: USER_END pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:13.616000 audit[1332]: CRED_DISP pid=1332 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:49:13.622788 sshd[1329]: pam_unix(sshd:session): session closed for user core May 10 00:49:13.622000 audit[1329]: USER_END pid=1329 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:13.623000 audit[1329]: CRED_DISP pid=1329 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:13.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-137.184.1.116:22-139.178.68.195:55838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:13.626526 systemd[1]: sshd@6-137.184.1.116:22-139.178.68.195:55838.service: Deactivated successfully. May 10 00:49:13.627359 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:49:13.627509 systemd[1]: session-7.scope: Consumed 5.591s CPU time. May 10 00:49:13.628715 systemd-logind[1179]: Session 7 logged out. Waiting for processes to exit. May 10 00:49:13.630172 systemd-logind[1179]: Removed session 7. May 10 00:49:13.633000 audit[2224]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.633000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe359db130 a2=0 a3=7ffe359db11c items=0 ppid=2062 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.633000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:49:13.642000 audit[2227]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.642000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffbec718b0 a2=0 a3=7fffbec7189c items=0 ppid=2062 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.642000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:49:13.644000 audit[2228]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.644000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffdd2abf80 a2=0 a3=7fffdd2abf6c items=0 ppid=2062 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.644000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:49:13.648000 audit[2230]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.648000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc19bea3d0 a2=0 a3=7ffc19bea3bc items=0 ppid=2062 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.648000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:49:13.653000 audit[2231]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.653000 audit[2231]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffebc7d2d60 a2=0 a3=7ffebc7d2d4c items=0 ppid=2062 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.653000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:49:13.657000 audit[2233]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.657000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa9d93300 a2=0 a3=7fffa9d932ec items=0 ppid=2062 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.657000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:49:13.663000 audit[2236]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.663000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc714ee140 a2=0 a3=7ffc714ee12c items=0 ppid=2062 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.663000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:49:13.665000 audit[2237]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.665000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcc8515460 a2=0 a3=7ffcc851544c items=0 ppid=2062 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.665000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:49:13.671000 audit[2239]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.671000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe5f9abe90 a2=0 a3=7ffe5f9abe7c items=0 ppid=2062 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.671000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:49:13.674000 audit[2240]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.674000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd2cc6acd0 a2=0 a3=7ffd2cc6acbc items=0 ppid=2062 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.674000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:49:13.679000 audit[2242]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.679000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe60efabb0 a2=0 a3=7ffe60efab9c items=0 ppid=2062 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.679000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:49:13.686000 audit[2245]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.686000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff0427e930 a2=0 a3=7fff0427e91c items=0 ppid=2062 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.686000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:49:13.694000 audit[2248]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.694000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc1fcdd30 a2=0 a3=7ffdc1fcdd1c items=0 ppid=2062 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.694000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:49:13.696000 audit[2249]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.696000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe191921b0 a2=0 a3=7ffe1919219c items=0 ppid=2062 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.696000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:49:13.702000 audit[2251]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.702000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe2b2632b0 a2=0 a3=7ffe2b26329c items=0 ppid=2062 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.702000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:49:13.710000 audit[2254]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.710000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd5aad6b00 a2=0 a3=7ffd5aad6aec items=0 ppid=2062 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.710000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:49:13.713000 audit[2255]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.713000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffecf3e24e0 a2=0 a3=7ffecf3e24cc items=0 ppid=2062 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.713000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:49:13.717000 audit[2257]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.717000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fffb9ac29e0 a2=0 a3=7fffb9ac29cc items=0 ppid=2062 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.717000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:49:13.719000 audit[2258]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.719000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe6f3976f0 a2=0 a3=7ffe6f3976dc items=0 ppid=2062 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.719000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:49:13.723000 audit[2260]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.723000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff57318630 a2=0 a3=7fff5731861c items=0 ppid=2062 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.723000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:49:13.729000 audit[2263]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:49:13.729000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc78f14820 a2=0 a3=7ffc78f1480c items=0 ppid=2062 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.729000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:49:13.733000 audit[2265]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:49:13.733000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff86114b40 a2=0 a3=7fff86114b2c items=0 ppid=2062 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.733000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:13.734000 audit[2265]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:49:13.734000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff86114b40 a2=0 a3=7fff86114b2c items=0 ppid=2062 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:13.734000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:14.465944 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1901490534.mount: Deactivated successfully. May 10 00:49:15.256725 kubelet[1942]: E0510 00:49:15.251540 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:15.275251 kubelet[1942]: I0510 00:49:15.275134 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-f62zc" podStartSLOduration=3.275098862 podStartE2EDuration="3.275098862s" podCreationTimestamp="2025-05-10 00:49:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:13.626871036 +0000 UTC m=+6.442444174" watchObservedRunningTime="2025-05-10 00:49:15.275098862 +0000 UTC m=+8.090671998" May 10 00:49:15.537115 env[1186]: time="2025-05-10T00:49:15.536959653Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:15.538607 env[1186]: time="2025-05-10T00:49:15.538568727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:15.540082 env[1186]: time="2025-05-10T00:49:15.540052491Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:15.545267 env[1186]: time="2025-05-10T00:49:15.545174996Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:49:15.546223 env[1186]: time="2025-05-10T00:49:15.546171165Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:15.557768 env[1186]: time="2025-05-10T00:49:15.556861725Z" level=info msg="CreateContainer within sandbox \"2069edb17058dca33c37630f400995f8294327e868c72491f2c3b0aeba7ceb6e\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:49:15.570834 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1226106909.mount: Deactivated successfully. May 10 00:49:15.581289 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3896057061.mount: Deactivated successfully. May 10 00:49:15.585486 env[1186]: time="2025-05-10T00:49:15.585312312Z" level=info msg="CreateContainer within sandbox \"2069edb17058dca33c37630f400995f8294327e868c72491f2c3b0aeba7ceb6e\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"405b172ea6fe7b31cf4a873e00d6f8d5e6b930e6965b5c780381ea5337a31890\"" May 10 00:49:15.588763 env[1186]: time="2025-05-10T00:49:15.588717926Z" level=info msg="StartContainer for \"405b172ea6fe7b31cf4a873e00d6f8d5e6b930e6965b5c780381ea5337a31890\"" May 10 00:49:15.611475 kubelet[1942]: E0510 00:49:15.609339 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:15.637604 systemd[1]: Started cri-containerd-405b172ea6fe7b31cf4a873e00d6f8d5e6b930e6965b5c780381ea5337a31890.scope. May 10 00:49:15.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.664000 audit: BPF prog-id=117 op=LOAD May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2085 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:15.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430356231373265613666653762333163663461383733653030643666 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2085 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:15.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430356231373265613666653762333163663461383733653030643666 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit: BPF prog-id=118 op=LOAD May 10 00:49:15.666000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001d7a90 items=0 ppid=2085 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:15.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430356231373265613666653762333163663461383733653030643666 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit: BPF prog-id=119 op=LOAD May 10 00:49:15.666000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001d7ad8 items=0 ppid=2085 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:15.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430356231373265613666653762333163663461383733653030643666 May 10 00:49:15.666000 audit: BPF prog-id=119 op=UNLOAD May 10 00:49:15.666000 audit: BPF prog-id=118 op=UNLOAD May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { perfmon } for pid=2273 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit[2273]: AVC avc: denied { bpf } for pid=2273 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:15.666000 audit: BPF prog-id=120 op=LOAD May 10 00:49:15.666000 audit[2273]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0001d7ee8 items=0 ppid=2085 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:15.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430356231373265613666653762333163663461383733653030643666 May 10 00:49:15.692760 env[1186]: time="2025-05-10T00:49:15.692688268Z" level=info msg="StartContainer for \"405b172ea6fe7b31cf4a873e00d6f8d5e6b930e6965b5c780381ea5337a31890\" returns successfully" May 10 00:49:18.410837 kubelet[1942]: E0510 00:49:18.410800 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:18.428148 kubelet[1942]: I0510 00:49:18.428078 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-kg29g" podStartSLOduration=3.914710445 podStartE2EDuration="6.42805274s" podCreationTimestamp="2025-05-10 00:49:12 +0000 UTC" firstStartedPulling="2025-05-10 00:49:13.039857932 +0000 UTC m=+5.855431046" lastFinishedPulling="2025-05-10 00:49:15.553200209 +0000 UTC m=+8.368773341" observedRunningTime="2025-05-10 00:49:16.626394571 +0000 UTC m=+9.441967708" watchObservedRunningTime="2025-05-10 00:49:18.42805274 +0000 UTC m=+11.243625875" May 10 00:49:18.693000 audit[2304]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:18.695883 kernel: kauditd_printk_skb: 362 callbacks suppressed May 10 00:49:18.695998 kernel: audit: type=1325 audit(1746838158.693:929): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:18.693000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc640ba310 a2=0 a3=7ffc640ba2fc items=0 ppid=2062 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:18.701333 kernel: audit: type=1300 audit(1746838158.693:929): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc640ba310 a2=0 a3=7ffc640ba2fc items=0 ppid=2062 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:18.701600 kernel: audit: type=1327 audit(1746838158.693:929): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:18.693000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:18.703000 audit[2304]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:18.707344 kernel: audit: type=1325 audit(1746838158.703:930): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:18.707500 kernel: audit: type=1300 audit(1746838158.703:930): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc640ba310 a2=0 a3=0 items=0 ppid=2062 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:18.703000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc640ba310 a2=0 a3=0 items=0 ppid=2062 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:18.703000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:18.713285 kernel: audit: type=1327 audit(1746838158.703:930): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:18.718000 audit[2306]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:18.722291 kernel: audit: type=1325 audit(1746838158.718:931): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:18.722473 kernel: audit: type=1300 audit(1746838158.718:931): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcaf01b7f0 a2=0 a3=7ffcaf01b7dc items=0 ppid=2062 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:18.718000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcaf01b7f0 a2=0 a3=7ffcaf01b7dc items=0 ppid=2062 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:18.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:18.722000 audit[2306]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:18.735896 kernel: audit: type=1327 audit(1746838158.718:931): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:18.736077 kernel: audit: type=1325 audit(1746838158.722:932): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:18.722000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcaf01b7f0 a2=0 a3=0 items=0 ppid=2062 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:18.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:18.976544 systemd[1]: Created slice kubepods-besteffort-poddaa7d441_e084_4251_8300_7b3dcdb0e74a.slice. May 10 00:49:19.034469 kubelet[1942]: I0510 00:49:19.034422 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/daa7d441-e084-4251-8300-7b3dcdb0e74a-typha-certs\") pod \"calico-typha-57664fd988-dstrk\" (UID: \"daa7d441-e084-4251-8300-7b3dcdb0e74a\") " pod="calico-system/calico-typha-57664fd988-dstrk" May 10 00:49:19.034647 kubelet[1942]: I0510 00:49:19.034518 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nrgx9\" (UniqueName: \"kubernetes.io/projected/daa7d441-e084-4251-8300-7b3dcdb0e74a-kube-api-access-nrgx9\") pod \"calico-typha-57664fd988-dstrk\" (UID: \"daa7d441-e084-4251-8300-7b3dcdb0e74a\") " pod="calico-system/calico-typha-57664fd988-dstrk" May 10 00:49:19.034647 kubelet[1942]: I0510 00:49:19.034545 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/daa7d441-e084-4251-8300-7b3dcdb0e74a-tigera-ca-bundle\") pod \"calico-typha-57664fd988-dstrk\" (UID: \"daa7d441-e084-4251-8300-7b3dcdb0e74a\") " pod="calico-system/calico-typha-57664fd988-dstrk" May 10 00:49:19.071138 systemd[1]: Created slice kubepods-besteffort-pod9afd2e5a_0f98_4e45_85f5_dd394310b370.slice. May 10 00:49:19.134932 kubelet[1942]: I0510 00:49:19.134873 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-xtables-lock\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135209 kubelet[1942]: I0510 00:49:19.135188 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-cni-net-dir\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135329 kubelet[1942]: I0510 00:49:19.135311 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9afd2e5a-0f98-4e45-85f5-dd394310b370-tigera-ca-bundle\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135419 kubelet[1942]: I0510 00:49:19.135405 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/9afd2e5a-0f98-4e45-85f5-dd394310b370-node-certs\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135521 kubelet[1942]: I0510 00:49:19.135508 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-cni-bin-dir\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135604 kubelet[1942]: I0510 00:49:19.135590 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-lib-modules\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135681 kubelet[1942]: I0510 00:49:19.135668 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-var-run-calico\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135760 kubelet[1942]: I0510 00:49:19.135744 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5x2f9\" (UniqueName: \"kubernetes.io/projected/9afd2e5a-0f98-4e45-85f5-dd394310b370-kube-api-access-5x2f9\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135834 kubelet[1942]: I0510 00:49:19.135821 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-policysync\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135902 kubelet[1942]: I0510 00:49:19.135890 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-cni-log-dir\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.135996 kubelet[1942]: I0510 00:49:19.135981 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-var-lib-calico\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.136084 kubelet[1942]: I0510 00:49:19.136068 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/9afd2e5a-0f98-4e45-85f5-dd394310b370-flexvol-driver-host\") pod \"calico-node-n68fd\" (UID: \"9afd2e5a-0f98-4e45-85f5-dd394310b370\") " pod="calico-system/calico-node-n68fd" May 10 00:49:19.235411 kubelet[1942]: E0510 00:49:19.235216 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7qrf9" podUID="76ed2555-08dd-48f1-8481-5c17a11b0064" May 10 00:49:19.250792 kubelet[1942]: E0510 00:49:19.250737 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.250792 kubelet[1942]: W0510 00:49:19.250780 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.251158 kubelet[1942]: E0510 00:49:19.250813 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.280613 kubelet[1942]: E0510 00:49:19.280566 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.281278 kubelet[1942]: W0510 00:49:19.280821 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.281278 kubelet[1942]: E0510 00:49:19.280862 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.282189 kubelet[1942]: E0510 00:49:19.282152 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:19.286307 env[1186]: time="2025-05-10T00:49:19.285625348Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57664fd988-dstrk,Uid:daa7d441-e084-4251-8300-7b3dcdb0e74a,Namespace:calico-system,Attempt:0,}" May 10 00:49:19.311910 kubelet[1942]: E0510 00:49:19.311865 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.311910 kubelet[1942]: W0510 00:49:19.311897 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.312157 kubelet[1942]: E0510 00:49:19.311939 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.312312 kubelet[1942]: E0510 00:49:19.312194 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.312312 kubelet[1942]: W0510 00:49:19.312266 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.312312 kubelet[1942]: E0510 00:49:19.312284 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.312554 kubelet[1942]: E0510 00:49:19.312534 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.312554 kubelet[1942]: W0510 00:49:19.312551 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.312653 kubelet[1942]: E0510 00:49:19.312565 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.312797 kubelet[1942]: E0510 00:49:19.312781 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.312797 kubelet[1942]: W0510 00:49:19.312794 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.312860 kubelet[1942]: E0510 00:49:19.312804 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.313008 kubelet[1942]: E0510 00:49:19.312992 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.313008 kubelet[1942]: W0510 00:49:19.313002 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.313097 kubelet[1942]: E0510 00:49:19.313010 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.313175 kubelet[1942]: E0510 00:49:19.313160 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.313175 kubelet[1942]: W0510 00:49:19.313170 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.313175 kubelet[1942]: E0510 00:49:19.313178 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.313357 kubelet[1942]: E0510 00:49:19.313344 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.313357 kubelet[1942]: W0510 00:49:19.313354 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.313527 kubelet[1942]: E0510 00:49:19.313361 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.313675 kubelet[1942]: E0510 00:49:19.313648 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.313675 kubelet[1942]: W0510 00:49:19.313672 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.313744 kubelet[1942]: E0510 00:49:19.313682 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.313883 kubelet[1942]: E0510 00:49:19.313868 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.313883 kubelet[1942]: W0510 00:49:19.313879 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.313955 kubelet[1942]: E0510 00:49:19.313887 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.314052 kubelet[1942]: E0510 00:49:19.314039 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.314052 kubelet[1942]: W0510 00:49:19.314048 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.314115 kubelet[1942]: E0510 00:49:19.314056 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.314210 kubelet[1942]: E0510 00:49:19.314198 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.314210 kubelet[1942]: W0510 00:49:19.314207 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.314300 kubelet[1942]: E0510 00:49:19.314215 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.314389 kubelet[1942]: E0510 00:49:19.314374 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.314389 kubelet[1942]: W0510 00:49:19.314385 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.314455 kubelet[1942]: E0510 00:49:19.314393 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.314571 kubelet[1942]: E0510 00:49:19.314555 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.314571 kubelet[1942]: W0510 00:49:19.314565 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.314648 kubelet[1942]: E0510 00:49:19.314575 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.314750 kubelet[1942]: E0510 00:49:19.314732 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.315137 kubelet[1942]: W0510 00:49:19.315114 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.315199 kubelet[1942]: E0510 00:49:19.315138 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.315447 kubelet[1942]: E0510 00:49:19.315425 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.315511 kubelet[1942]: W0510 00:49:19.315448 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.315511 kubelet[1942]: E0510 00:49:19.315463 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.315697 kubelet[1942]: E0510 00:49:19.315680 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.315697 kubelet[1942]: W0510 00:49:19.315693 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.315771 kubelet[1942]: E0510 00:49:19.315703 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.315912 kubelet[1942]: E0510 00:49:19.315897 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.315912 kubelet[1942]: W0510 00:49:19.315909 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.316008 kubelet[1942]: E0510 00:49:19.315918 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.316091 kubelet[1942]: E0510 00:49:19.316076 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.316091 kubelet[1942]: W0510 00:49:19.316087 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.316156 kubelet[1942]: E0510 00:49:19.316094 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.316335 kubelet[1942]: E0510 00:49:19.316319 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.316335 kubelet[1942]: W0510 00:49:19.316331 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.316419 kubelet[1942]: E0510 00:49:19.316341 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.316516 kubelet[1942]: E0510 00:49:19.316503 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.316516 kubelet[1942]: W0510 00:49:19.316513 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.316580 kubelet[1942]: E0510 00:49:19.316520 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.318882 env[1186]: time="2025-05-10T00:49:19.318777702Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:19.319125 env[1186]: time="2025-05-10T00:49:19.319098048Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:19.319274 env[1186]: time="2025-05-10T00:49:19.319219678Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:19.319942 env[1186]: time="2025-05-10T00:49:19.319850855Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/96b14f721751fcb193b5a62581c4df56a1b53ccbda2f433e0199c15b440bba2b pid=2321 runtime=io.containerd.runc.v2 May 10 00:49:19.341710 kubelet[1942]: E0510 00:49:19.341662 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.341710 kubelet[1942]: W0510 00:49:19.341693 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.341710 kubelet[1942]: E0510 00:49:19.341720 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.342166 kubelet[1942]: I0510 00:49:19.341762 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/76ed2555-08dd-48f1-8481-5c17a11b0064-varrun\") pod \"csi-node-driver-7qrf9\" (UID: \"76ed2555-08dd-48f1-8481-5c17a11b0064\") " pod="calico-system/csi-node-driver-7qrf9" May 10 00:49:19.348075 kubelet[1942]: E0510 00:49:19.348022 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.348075 kubelet[1942]: W0510 00:49:19.348061 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.348406 kubelet[1942]: E0510 00:49:19.348101 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.348406 kubelet[1942]: I0510 00:49:19.348137 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/76ed2555-08dd-48f1-8481-5c17a11b0064-socket-dir\") pod \"csi-node-driver-7qrf9\" (UID: \"76ed2555-08dd-48f1-8481-5c17a11b0064\") " pod="calico-system/csi-node-driver-7qrf9" May 10 00:49:19.348852 kubelet[1942]: E0510 00:49:19.348803 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.348852 kubelet[1942]: W0510 00:49:19.348844 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.352660 kubelet[1942]: E0510 00:49:19.352603 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.352920 kubelet[1942]: I0510 00:49:19.352674 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/76ed2555-08dd-48f1-8481-5c17a11b0064-registration-dir\") pod \"csi-node-driver-7qrf9\" (UID: \"76ed2555-08dd-48f1-8481-5c17a11b0064\") " pod="calico-system/csi-node-driver-7qrf9" May 10 00:49:19.352920 kubelet[1942]: E0510 00:49:19.352886 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.352920 kubelet[1942]: W0510 00:49:19.352910 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.353416 kubelet[1942]: E0510 00:49:19.353153 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.353566 kubelet[1942]: E0510 00:49:19.353472 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.353566 kubelet[1942]: W0510 00:49:19.353505 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.353678 kubelet[1942]: E0510 00:49:19.353658 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.356161 kubelet[1942]: E0510 00:49:19.355448 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.356161 kubelet[1942]: W0510 00:49:19.355484 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.356161 kubelet[1942]: E0510 00:49:19.355524 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.356161 kubelet[1942]: I0510 00:49:19.355578 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/76ed2555-08dd-48f1-8481-5c17a11b0064-kubelet-dir\") pod \"csi-node-driver-7qrf9\" (UID: \"76ed2555-08dd-48f1-8481-5c17a11b0064\") " pod="calico-system/csi-node-driver-7qrf9" May 10 00:49:19.356161 kubelet[1942]: E0510 00:49:19.356004 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.356161 kubelet[1942]: W0510 00:49:19.356021 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.356161 kubelet[1942]: E0510 00:49:19.356040 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.358214 kubelet[1942]: E0510 00:49:19.357023 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.358214 kubelet[1942]: W0510 00:49:19.357046 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.358214 kubelet[1942]: E0510 00:49:19.357068 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.358214 kubelet[1942]: E0510 00:49:19.357532 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.358214 kubelet[1942]: W0510 00:49:19.357550 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.358214 kubelet[1942]: E0510 00:49:19.357575 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.358214 kubelet[1942]: E0510 00:49:19.357835 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.358214 kubelet[1942]: W0510 00:49:19.357848 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.358214 kubelet[1942]: E0510 00:49:19.357883 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.359029 kubelet[1942]: I0510 00:49:19.357920 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-75qjn\" (UniqueName: \"kubernetes.io/projected/76ed2555-08dd-48f1-8481-5c17a11b0064-kube-api-access-75qjn\") pod \"csi-node-driver-7qrf9\" (UID: \"76ed2555-08dd-48f1-8481-5c17a11b0064\") " pod="calico-system/csi-node-driver-7qrf9" May 10 00:49:19.360055 kubelet[1942]: E0510 00:49:19.359436 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.360055 kubelet[1942]: W0510 00:49:19.359463 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.360055 kubelet[1942]: E0510 00:49:19.359499 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.360055 kubelet[1942]: E0510 00:49:19.359823 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.360055 kubelet[1942]: W0510 00:49:19.359837 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.360055 kubelet[1942]: E0510 00:49:19.359853 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.361295 kubelet[1942]: E0510 00:49:19.361038 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.361295 kubelet[1942]: W0510 00:49:19.361061 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.361295 kubelet[1942]: E0510 00:49:19.361091 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.364454 kubelet[1942]: E0510 00:49:19.364031 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.364454 kubelet[1942]: W0510 00:49:19.364064 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.364454 kubelet[1942]: E0510 00:49:19.364188 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.364985 kubelet[1942]: E0510 00:49:19.364960 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.367420 kubelet[1942]: W0510 00:49:19.367366 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.367758 kubelet[1942]: E0510 00:49:19.367674 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.375369 kubelet[1942]: E0510 00:49:19.374631 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:19.375628 env[1186]: time="2025-05-10T00:49:19.375323016Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n68fd,Uid:9afd2e5a-0f98-4e45-85f5-dd394310b370,Namespace:calico-system,Attempt:0,}" May 10 00:49:19.386298 systemd[1]: Started cri-containerd-96b14f721751fcb193b5a62581c4df56a1b53ccbda2f433e0199c15b440bba2b.scope. May 10 00:49:19.406876 env[1186]: time="2025-05-10T00:49:19.406734114Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:19.406876 env[1186]: time="2025-05-10T00:49:19.406799753Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:19.406876 env[1186]: time="2025-05-10T00:49:19.406811247Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:19.407322 env[1186]: time="2025-05-10T00:49:19.407094609Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab pid=2382 runtime=io.containerd.runc.v2 May 10 00:49:19.445940 systemd[1]: Started cri-containerd-5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab.scope. May 10 00:49:19.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.452000 audit: BPF prog-id=121 op=LOAD May 10 00:49:19.455000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.455000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2321 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.455000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623134663732313735316663623139336235613632353831633464 May 10 00:49:19.456000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.456000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2321 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.456000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623134663732313735316663623139336235613632353831633464 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.457000 audit: BPF prog-id=122 op=LOAD May 10 00:49:19.457000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009c360 items=0 ppid=2321 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.457000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623134663732313735316663623139336235613632353831633464 May 10 00:49:19.462067 kubelet[1942]: E0510 00:49:19.460836 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.462067 kubelet[1942]: W0510 00:49:19.460864 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.462067 kubelet[1942]: E0510 00:49:19.460891 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.462067 kubelet[1942]: E0510 00:49:19.461109 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.462067 kubelet[1942]: W0510 00:49:19.461118 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.462067 kubelet[1942]: E0510 00:49:19.461128 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.462067 kubelet[1942]: E0510 00:49:19.461413 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.462067 kubelet[1942]: W0510 00:49:19.461438 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.462067 kubelet[1942]: E0510 00:49:19.461461 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.466126 kubelet[1942]: E0510 00:49:19.462411 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.466126 kubelet[1942]: W0510 00:49:19.462433 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.466126 kubelet[1942]: E0510 00:49:19.462462 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.466126 kubelet[1942]: E0510 00:49:19.462919 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.466126 kubelet[1942]: W0510 00:49:19.462935 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.466126 kubelet[1942]: E0510 00:49:19.462965 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.466965 kubelet[1942]: E0510 00:49:19.466683 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.466965 kubelet[1942]: W0510 00:49:19.466721 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.466965 kubelet[1942]: E0510 00:49:19.466869 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.469769 kubelet[1942]: E0510 00:49:19.469439 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.469769 kubelet[1942]: W0510 00:49:19.469542 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.469769 kubelet[1942]: E0510 00:49:19.469648 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.470440 kubelet[1942]: E0510 00:49:19.470210 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.470440 kubelet[1942]: W0510 00:49:19.470233 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.470440 kubelet[1942]: E0510 00:49:19.470334 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.470937 kubelet[1942]: E0510 00:49:19.470758 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.470937 kubelet[1942]: W0510 00:49:19.470786 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.471088 kubelet[1942]: E0510 00:49:19.470981 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.471532 kubelet[1942]: E0510 00:49:19.471228 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.471532 kubelet[1942]: W0510 00:49:19.471258 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.471532 kubelet[1942]: E0510 00:49:19.471489 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.472072 kubelet[1942]: E0510 00:49:19.471900 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.472072 kubelet[1942]: W0510 00:49:19.471919 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.472072 kubelet[1942]: E0510 00:49:19.471984 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.472613 kubelet[1942]: E0510 00:49:19.472445 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.472613 kubelet[1942]: W0510 00:49:19.472464 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.472613 kubelet[1942]: E0510 00:49:19.472608 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.473882 kubelet[1942]: E0510 00:49:19.472989 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.473882 kubelet[1942]: W0510 00:49:19.473008 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.473882 kubelet[1942]: E0510 00:49:19.473196 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.474565 kubelet[1942]: E0510 00:49:19.474324 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.474565 kubelet[1942]: W0510 00:49:19.474346 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.474811 kubelet[1942]: E0510 00:49:19.474561 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.479019 kubelet[1942]: E0510 00:49:19.478638 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.479019 kubelet[1942]: W0510 00:49:19.478708 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.479019 kubelet[1942]: E0510 00:49:19.478785 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.481597 kubelet[1942]: E0510 00:49:19.481447 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.481597 kubelet[1942]: W0510 00:49:19.481521 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.482131 kubelet[1942]: E0510 00:49:19.481902 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.482000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.483929 kubelet[1942]: E0510 00:49:19.483900 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.484095 kubelet[1942]: W0510 00:49:19.484068 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.484541 kubelet[1942]: E0510 00:49:19.484459 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.482000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.482000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.482000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.482000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.482000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.482000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.482000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485224 kubelet[1942]: E0510 00:49:19.485201 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.485369 kubelet[1942]: W0510 00:49:19.485345 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.482000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.482000 audit: BPF prog-id=123 op=LOAD May 10 00:49:19.482000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009c3a8 items=0 ppid=2321 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623134663732313735316663623139336235613632353831633464 May 10 00:49:19.485000 audit: BPF prog-id=123 op=UNLOAD May 10 00:49:19.485000 audit: BPF prog-id=122 op=UNLOAD May 10 00:49:19.485000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.485000 audit: BPF prog-id=124 op=LOAD May 10 00:49:19.485000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009c7b8 items=0 ppid=2321 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3936623134663732313735316663623139336235613632353831633464 May 10 00:49:19.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.495000 audit: BPF prog-id=125 op=LOAD May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333263663331373061383330653937623339326232623766396365 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333263663331373061383330653937623339326232623766396365 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit: BPF prog-id=126 op=LOAD May 10 00:49:19.496000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00039b060 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333263663331373061383330653937623339326232623766396365 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.496000 audit: BPF prog-id=127 op=LOAD May 10 00:49:19.496000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00039b0a8 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333263663331373061383330653937623339326232623766396365 May 10 00:49:19.497000 audit: BPF prog-id=127 op=UNLOAD May 10 00:49:19.497000 audit: BPF prog-id=126 op=UNLOAD May 10 00:49:19.497000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { perfmon } for pid=2392 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit[2392]: AVC avc: denied { bpf } for pid=2392 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:19.497000 audit: BPF prog-id=128 op=LOAD May 10 00:49:19.497000 audit[2392]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00039b4b8 items=0 ppid=2382 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562333263663331373061383330653937623339326232623766396365 May 10 00:49:19.518201 kubelet[1942]: E0510 00:49:19.485842 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.518201 kubelet[1942]: E0510 00:49:19.486739 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.518201 kubelet[1942]: W0510 00:49:19.500719 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.518201 kubelet[1942]: E0510 00:49:19.503020 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.518201 kubelet[1942]: E0510 00:49:19.503347 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.518201 kubelet[1942]: W0510 00:49:19.503368 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.518201 kubelet[1942]: E0510 00:49:19.503576 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.518201 kubelet[1942]: E0510 00:49:19.503763 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.518201 kubelet[1942]: W0510 00:49:19.503772 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.518201 kubelet[1942]: E0510 00:49:19.503880 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.519848 kubelet[1942]: E0510 00:49:19.504009 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.519848 kubelet[1942]: W0510 00:49:19.504016 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.519848 kubelet[1942]: E0510 00:49:19.504117 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.519848 kubelet[1942]: E0510 00:49:19.504226 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.519848 kubelet[1942]: W0510 00:49:19.504233 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.519848 kubelet[1942]: E0510 00:49:19.504339 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.519848 kubelet[1942]: E0510 00:49:19.504449 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.519848 kubelet[1942]: W0510 00:49:19.504458 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.519848 kubelet[1942]: E0510 00:49:19.504562 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.519848 kubelet[1942]: E0510 00:49:19.504974 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.522640 kubelet[1942]: W0510 00:49:19.504989 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.522640 kubelet[1942]: E0510 00:49:19.505006 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.535750 kubelet[1942]: E0510 00:49:19.535704 1942 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:49:19.536062 kubelet[1942]: W0510 00:49:19.536030 1942 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:49:19.536182 kubelet[1942]: E0510 00:49:19.536160 1942 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:49:19.564288 env[1186]: time="2025-05-10T00:49:19.562697388Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-n68fd,Uid:9afd2e5a-0f98-4e45-85f5-dd394310b370,Namespace:calico-system,Attempt:0,} returns sandbox id \"5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab\"" May 10 00:49:19.566338 kubelet[1942]: E0510 00:49:19.566224 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:19.572847 env[1186]: time="2025-05-10T00:49:19.572788181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:49:19.573754 env[1186]: time="2025-05-10T00:49:19.572808116Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-57664fd988-dstrk,Uid:daa7d441-e084-4251-8300-7b3dcdb0e74a,Namespace:calico-system,Attempt:0,} returns sandbox id \"96b14f721751fcb193b5a62581c4df56a1b53ccbda2f433e0199c15b440bba2b\"" May 10 00:49:19.577340 kubelet[1942]: E0510 00:49:19.576465 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:19.760000 audit[2456]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:19.760000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffebca47b00 a2=0 a3=7ffebca47aec items=0 ppid=2062 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:19.766000 audit[2456]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2456 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:19.766000 audit[2456]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffebca47b00 a2=0 a3=0 items=0 ppid=2062 pid=2456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:19.766000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:20.875471 env[1186]: time="2025-05-10T00:49:20.875396470Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:20.877359 env[1186]: time="2025-05-10T00:49:20.877306673Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:20.880220 env[1186]: time="2025-05-10T00:49:20.880147747Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:20.882292 env[1186]: time="2025-05-10T00:49:20.882207344Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:20.883016 env[1186]: time="2025-05-10T00:49:20.882940069Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:49:20.885576 env[1186]: time="2025-05-10T00:49:20.885457139Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:49:20.890551 env[1186]: time="2025-05-10T00:49:20.890495962Z" level=info msg="CreateContainer within sandbox \"5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:49:20.921329 env[1186]: time="2025-05-10T00:49:20.921222263Z" level=info msg="CreateContainer within sandbox \"5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01\"" May 10 00:49:20.922494 env[1186]: time="2025-05-10T00:49:20.922450719Z" level=info msg="StartContainer for \"c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01\"" May 10 00:49:20.966256 systemd[1]: Started cri-containerd-c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01.scope. May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fc561345bd8 items=0 ppid=2382 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:20.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623533656531366539313638363839313136616539343335356337 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit: BPF prog-id=129 op=LOAD May 10 00:49:20.986000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a0e18 items=0 ppid=2382 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:20.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623533656531366539313638363839313136616539343335356337 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit: BPF prog-id=130 op=LOAD May 10 00:49:20.986000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0e68 items=0 ppid=2382 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:20.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623533656531366539313638363839313136616539343335356337 May 10 00:49:20.986000 audit: BPF prog-id=130 op=UNLOAD May 10 00:49:20.986000 audit: BPF prog-id=129 op=UNLOAD May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { perfmon } for pid=2464 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit[2464]: AVC avc: denied { bpf } for pid=2464 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:20.986000 audit: BPF prog-id=131 op=LOAD May 10 00:49:20.986000 audit[2464]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0ef8 items=0 ppid=2382 pid=2464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:20.986000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330623533656531366539313638363839313136616539343335356337 May 10 00:49:21.011222 env[1186]: time="2025-05-10T00:49:21.011147276Z" level=info msg="StartContainer for \"c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01\" returns successfully" May 10 00:49:21.034485 systemd[1]: cri-containerd-c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01.scope: Deactivated successfully. May 10 00:49:21.037000 audit: BPF prog-id=131 op=UNLOAD May 10 00:49:21.089723 env[1186]: time="2025-05-10T00:49:21.089649388Z" level=info msg="shim disconnected" id=c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01 May 10 00:49:21.089723 env[1186]: time="2025-05-10T00:49:21.089719437Z" level=warning msg="cleaning up after shim disconnected" id=c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01 namespace=k8s.io May 10 00:49:21.089723 env[1186]: time="2025-05-10T00:49:21.089733784Z" level=info msg="cleaning up dead shim" May 10 00:49:21.110733 env[1186]: time="2025-05-10T00:49:21.110360771Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:49:21Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2509 runtime=io.containerd.runc.v2\n" May 10 00:49:21.141027 systemd[1]: run-containerd-runc-k8s.io-c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01-runc.JbZtV4.mount: Deactivated successfully. May 10 00:49:21.141189 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c0b53ee16e9168689116ae94355c74e9436599a34b14416085c2f19fc26f2c01-rootfs.mount: Deactivated successfully. May 10 00:49:21.508525 kubelet[1942]: E0510 00:49:21.508468 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7qrf9" podUID="76ed2555-08dd-48f1-8481-5c17a11b0064" May 10 00:49:21.628222 kubelet[1942]: E0510 00:49:21.628177 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:22.905400 update_engine[1180]: I0510 00:49:22.905333 1180 update_attempter.cc:509] Updating boot flags... May 10 00:49:23.289754 env[1186]: time="2025-05-10T00:49:23.289695885Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:23.291880 env[1186]: time="2025-05-10T00:49:23.291824139Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:23.293659 env[1186]: time="2025-05-10T00:49:23.292879967Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:23.295837 env[1186]: time="2025-05-10T00:49:23.295790852Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:23.296829 env[1186]: time="2025-05-10T00:49:23.296785538Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:49:23.299685 env[1186]: time="2025-05-10T00:49:23.299640801Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:49:23.325652 env[1186]: time="2025-05-10T00:49:23.325045496Z" level=info msg="CreateContainer within sandbox \"96b14f721751fcb193b5a62581c4df56a1b53ccbda2f433e0199c15b440bba2b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:49:23.361011 env[1186]: time="2025-05-10T00:49:23.360935306Z" level=info msg="CreateContainer within sandbox \"96b14f721751fcb193b5a62581c4df56a1b53ccbda2f433e0199c15b440bba2b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"72e4cdafaca682570ac866fa22088f790138f85b70029d3b78e80475163e23a1\"" May 10 00:49:23.362229 env[1186]: time="2025-05-10T00:49:23.362183904Z" level=info msg="StartContainer for \"72e4cdafaca682570ac866fa22088f790138f85b70029d3b78e80475163e23a1\"" May 10 00:49:23.393874 systemd[1]: Started cri-containerd-72e4cdafaca682570ac866fa22088f790138f85b70029d3b78e80475163e23a1.scope. May 10 00:49:23.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.435000 audit: BPF prog-id=132 op=LOAD May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2321 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:23.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653463646166616361363832353730616338363666613232303838 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2321 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:23.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653463646166616361363832353730616338363666613232303838 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit: BPF prog-id=133 op=LOAD May 10 00:49:23.436000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dff00 items=0 ppid=2321 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:23.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653463646166616361363832353730616338363666613232303838 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit: BPF prog-id=134 op=LOAD May 10 00:49:23.436000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dff48 items=0 ppid=2321 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:23.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653463646166616361363832353730616338363666613232303838 May 10 00:49:23.436000 audit: BPF prog-id=134 op=UNLOAD May 10 00:49:23.436000 audit: BPF prog-id=133 op=UNLOAD May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:23.436000 audit: BPF prog-id=135 op=LOAD May 10 00:49:23.436000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ae358 items=0 ppid=2321 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:23.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732653463646166616361363832353730616338363666613232303838 May 10 00:49:23.484204 env[1186]: time="2025-05-10T00:49:23.483716305Z" level=info msg="StartContainer for \"72e4cdafaca682570ac866fa22088f790138f85b70029d3b78e80475163e23a1\" returns successfully" May 10 00:49:23.511015 kubelet[1942]: E0510 00:49:23.510930 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7qrf9" podUID="76ed2555-08dd-48f1-8481-5c17a11b0064" May 10 00:49:23.635558 kubelet[1942]: E0510 00:49:23.635427 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:23.680574 kubelet[1942]: I0510 00:49:23.680478 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-57664fd988-dstrk" podStartSLOduration=1.963242664 podStartE2EDuration="5.680453906s" podCreationTimestamp="2025-05-10 00:49:18 +0000 UTC" firstStartedPulling="2025-05-10 00:49:19.581900469 +0000 UTC m=+12.397473599" lastFinishedPulling="2025-05-10 00:49:23.299111712 +0000 UTC m=+16.114684841" observedRunningTime="2025-05-10 00:49:23.676822333 +0000 UTC m=+16.492395469" watchObservedRunningTime="2025-05-10 00:49:23.680453906 +0000 UTC m=+16.496027041" May 10 00:49:24.307782 systemd[1]: run-containerd-runc-k8s.io-72e4cdafaca682570ac866fa22088f790138f85b70029d3b78e80475163e23a1-runc.nUxxgj.mount: Deactivated successfully. May 10 00:49:24.636440 kubelet[1942]: I0510 00:49:24.636308 1942 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:49:24.636991 kubelet[1942]: E0510 00:49:24.636932 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:25.509156 kubelet[1942]: E0510 00:49:25.508622 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7qrf9" podUID="76ed2555-08dd-48f1-8481-5c17a11b0064" May 10 00:49:27.509279 kubelet[1942]: E0510 00:49:27.509136 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7qrf9" podUID="76ed2555-08dd-48f1-8481-5c17a11b0064" May 10 00:49:28.790627 env[1186]: time="2025-05-10T00:49:28.790546265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:28.794530 env[1186]: time="2025-05-10T00:49:28.794455373Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:28.796125 env[1186]: time="2025-05-10T00:49:28.796064305Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:28.797877 env[1186]: time="2025-05-10T00:49:28.797808573Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:28.799150 env[1186]: time="2025-05-10T00:49:28.799071983Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:49:28.806278 env[1186]: time="2025-05-10T00:49:28.806184104Z" level=info msg="CreateContainer within sandbox \"5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:49:28.825129 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1951014168.mount: Deactivated successfully. May 10 00:49:28.839071 env[1186]: time="2025-05-10T00:49:28.838908278Z" level=info msg="CreateContainer within sandbox \"5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c\"" May 10 00:49:28.840566 env[1186]: time="2025-05-10T00:49:28.840512600Z" level=info msg="StartContainer for \"3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c\"" May 10 00:49:28.905672 systemd[1]: Started cri-containerd-3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c.scope. May 10 00:49:28.938317 kernel: kauditd_printk_skb: 223 callbacks suppressed May 10 00:49:28.938532 kernel: audit: type=1400 audit(1746838168.933:996): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa60051bb18 items=0 ppid=2382 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.953331 kernel: audit: type=1300 audit(1746838168.933:996): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa60051bb18 items=0 ppid=2382 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.953552 kernel: audit: type=1327 audit(1746838168.933:996): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636135666234363635613764653163396463633836353239393363 May 10 00:49:28.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636135666234363635613764653163396463633836353239393363 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.961498 kernel: audit: type=1400 audit(1746838168.933:997): avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.961688 kernel: audit: type=1400 audit(1746838168.933:997): avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.966959 kernel: audit: type=1400 audit(1746838168.933:997): avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.967124 kernel: audit: type=1400 audit(1746838168.933:997): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.971674 kernel: audit: type=1400 audit(1746838168.933:997): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.971834 kernel: audit: type=1400 audit(1746838168.933:997): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.975289 kernel: audit: type=1400 audit(1746838168.933:997): avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit: BPF prog-id=136 op=LOAD May 10 00:49:28.933000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030b108 items=0 ppid=2382 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636135666234363635613764653163396463633836353239393363 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.933000 audit: BPF prog-id=137 op=LOAD May 10 00:49:28.933000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030b158 items=0 ppid=2382 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636135666234363635613764653163396463633836353239393363 May 10 00:49:28.934000 audit: BPF prog-id=137 op=UNLOAD May 10 00:49:28.934000 audit: BPF prog-id=136 op=UNLOAD May 10 00:49:28.934000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:28.934000 audit: BPF prog-id=138 op=LOAD May 10 00:49:28.934000 audit[2592]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030b1e8 items=0 ppid=2382 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:28.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3366636135666234363635613764653163396463633836353239393363 May 10 00:49:28.991845 env[1186]: time="2025-05-10T00:49:28.991780805Z" level=info msg="StartContainer for \"3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c\" returns successfully" May 10 00:49:29.508952 kubelet[1942]: E0510 00:49:29.508876 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7qrf9" podUID="76ed2555-08dd-48f1-8481-5c17a11b0064" May 10 00:49:29.618544 systemd[1]: cri-containerd-3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c.scope: Deactivated successfully. May 10 00:49:29.621000 audit: BPF prog-id=138 op=UNLOAD May 10 00:49:29.652387 kubelet[1942]: E0510 00:49:29.651445 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:29.662025 env[1186]: time="2025-05-10T00:49:29.661965849Z" level=info msg="shim disconnected" id=3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c May 10 00:49:29.662025 env[1186]: time="2025-05-10T00:49:29.662016696Z" level=warning msg="cleaning up after shim disconnected" id=3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c namespace=k8s.io May 10 00:49:29.662025 env[1186]: time="2025-05-10T00:49:29.662026341Z" level=info msg="cleaning up dead shim" May 10 00:49:29.684921 kubelet[1942]: I0510 00:49:29.683967 1942 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 10 00:49:29.693083 env[1186]: time="2025-05-10T00:49:29.693014679Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:49:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2633 runtime=io.containerd.runc.v2\n" May 10 00:49:29.763994 systemd[1]: Created slice kubepods-burstable-pod6712168e_7716_472d_9f5c_721fe9599338.slice. May 10 00:49:29.786468 kubelet[1942]: W0510 00:49:29.786411 1942 reflector.go:561] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.7-n-7542157996" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.7-n-7542157996' and this object May 10 00:49:29.786700 kubelet[1942]: E0510 00:49:29.786476 1942 reflector.go:158] "Unhandled Error" err="object-\"kube-system\"/\"coredns\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"coredns\" is forbidden: User \"system:node:ci-3510.3.7-n-7542157996\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"kube-system\": no relationship found between node 'ci-3510.3.7-n-7542157996' and this object" logger="UnhandledError" May 10 00:49:29.789823 systemd[1]: Created slice kubepods-besteffort-pod386f41f8_cbb4_41b5_b490_165b6012419b.slice. May 10 00:49:29.820142 systemd[1]: run-containerd-runc-k8s.io-3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c-runc.sYOT70.mount: Deactivated successfully. May 10 00:49:29.820936 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3fca5fb4665a7de1c9dcc8652993c18218e4391e6dba808e9cb5394166d7b18c-rootfs.mount: Deactivated successfully. May 10 00:49:29.835346 systemd[1]: Created slice kubepods-burstable-pod658c528b_9320_4600_9e74_e5919a8d11ff.slice. May 10 00:49:29.839956 kubelet[1942]: I0510 00:49:29.839906 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8d9jd\" (UniqueName: \"kubernetes.io/projected/658c528b-9320-4600-9e74-e5919a8d11ff-kube-api-access-8d9jd\") pod \"coredns-6f6b679f8f-cvd85\" (UID: \"658c528b-9320-4600-9e74-e5919a8d11ff\") " pod="kube-system/coredns-6f6b679f8f-cvd85" May 10 00:49:29.840281 kubelet[1942]: I0510 00:49:29.840215 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qgptg\" (UniqueName: \"kubernetes.io/projected/5d27ebc2-318a-4cd0-8b96-ed411e05461e-kube-api-access-qgptg\") pod \"calico-apiserver-65b9b9f465-tvlz9\" (UID: \"5d27ebc2-318a-4cd0-8b96-ed411e05461e\") " pod="calico-apiserver/calico-apiserver-65b9b9f465-tvlz9" May 10 00:49:29.840460 kubelet[1942]: I0510 00:49:29.840435 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/386f41f8-cbb4-41b5-b490-165b6012419b-tigera-ca-bundle\") pod \"calico-kube-controllers-c784ff45b-6hpcv\" (UID: \"386f41f8-cbb4-41b5-b490-165b6012419b\") " pod="calico-system/calico-kube-controllers-c784ff45b-6hpcv" May 10 00:49:29.840607 kubelet[1942]: I0510 00:49:29.840583 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1da4b4d0-3ee1-4926-bb82-46a685e086be-calico-apiserver-certs\") pod \"calico-apiserver-65b9b9f465-xp854\" (UID: \"1da4b4d0-3ee1-4926-bb82-46a685e086be\") " pod="calico-apiserver/calico-apiserver-65b9b9f465-xp854" May 10 00:49:29.840750 kubelet[1942]: I0510 00:49:29.840725 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/658c528b-9320-4600-9e74-e5919a8d11ff-config-volume\") pod \"coredns-6f6b679f8f-cvd85\" (UID: \"658c528b-9320-4600-9e74-e5919a8d11ff\") " pod="kube-system/coredns-6f6b679f8f-cvd85" May 10 00:49:29.840903 kubelet[1942]: I0510 00:49:29.840879 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cgsd4\" (UniqueName: \"kubernetes.io/projected/6712168e-7716-472d-9f5c-721fe9599338-kube-api-access-cgsd4\") pod \"coredns-6f6b679f8f-wsjx2\" (UID: \"6712168e-7716-472d-9f5c-721fe9599338\") " pod="kube-system/coredns-6f6b679f8f-wsjx2" May 10 00:49:29.841060 kubelet[1942]: I0510 00:49:29.841034 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/5d27ebc2-318a-4cd0-8b96-ed411e05461e-calico-apiserver-certs\") pod \"calico-apiserver-65b9b9f465-tvlz9\" (UID: \"5d27ebc2-318a-4cd0-8b96-ed411e05461e\") " pod="calico-apiserver/calico-apiserver-65b9b9f465-tvlz9" May 10 00:49:29.841178 kubelet[1942]: I0510 00:49:29.841161 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/6712168e-7716-472d-9f5c-721fe9599338-config-volume\") pod \"coredns-6f6b679f8f-wsjx2\" (UID: \"6712168e-7716-472d-9f5c-721fe9599338\") " pod="kube-system/coredns-6f6b679f8f-wsjx2" May 10 00:49:29.841295 kubelet[1942]: I0510 00:49:29.841266 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nvnfn\" (UniqueName: \"kubernetes.io/projected/1da4b4d0-3ee1-4926-bb82-46a685e086be-kube-api-access-nvnfn\") pod \"calico-apiserver-65b9b9f465-xp854\" (UID: \"1da4b4d0-3ee1-4926-bb82-46a685e086be\") " pod="calico-apiserver/calico-apiserver-65b9b9f465-xp854" May 10 00:49:29.841399 kubelet[1942]: I0510 00:49:29.841383 1942 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vrfn9\" (UniqueName: \"kubernetes.io/projected/386f41f8-cbb4-41b5-b490-165b6012419b-kube-api-access-vrfn9\") pod \"calico-kube-controllers-c784ff45b-6hpcv\" (UID: \"386f41f8-cbb4-41b5-b490-165b6012419b\") " pod="calico-system/calico-kube-controllers-c784ff45b-6hpcv" May 10 00:49:29.847426 systemd[1]: Created slice kubepods-besteffort-pod5d27ebc2_318a_4cd0_8b96_ed411e05461e.slice. May 10 00:49:29.861047 systemd[1]: Created slice kubepods-besteffort-pod1da4b4d0_3ee1_4926_bb82_46a685e086be.slice. May 10 00:49:30.112394 env[1186]: time="2025-05-10T00:49:30.110821137Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c784ff45b-6hpcv,Uid:386f41f8-cbb4-41b5-b490-165b6012419b,Namespace:calico-system,Attempt:0,}" May 10 00:49:30.159494 env[1186]: time="2025-05-10T00:49:30.159448234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65b9b9f465-tvlz9,Uid:5d27ebc2-318a-4cd0-8b96-ed411e05461e,Namespace:calico-apiserver,Attempt:0,}" May 10 00:49:30.167989 env[1186]: time="2025-05-10T00:49:30.167900339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65b9b9f465-xp854,Uid:1da4b4d0-3ee1-4926-bb82-46a685e086be,Namespace:calico-apiserver,Attempt:0,}" May 10 00:49:30.413955 env[1186]: time="2025-05-10T00:49:30.413444421Z" level=error msg="Failed to destroy network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.414744 env[1186]: time="2025-05-10T00:49:30.414673270Z" level=error msg="encountered an error cleaning up failed sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.415033 env[1186]: time="2025-05-10T00:49:30.414980379Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c784ff45b-6hpcv,Uid:386f41f8-cbb4-41b5-b490-165b6012419b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.416499 kubelet[1942]: E0510 00:49:30.416428 1942 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.416696 kubelet[1942]: E0510 00:49:30.416556 1942 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c784ff45b-6hpcv" May 10 00:49:30.416696 kubelet[1942]: E0510 00:49:30.416585 1942 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c784ff45b-6hpcv" May 10 00:49:30.416696 kubelet[1942]: E0510 00:49:30.416657 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-c784ff45b-6hpcv_calico-system(386f41f8-cbb4-41b5-b490-165b6012419b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-c784ff45b-6hpcv_calico-system(386f41f8-cbb4-41b5-b490-165b6012419b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c784ff45b-6hpcv" podUID="386f41f8-cbb4-41b5-b490-165b6012419b" May 10 00:49:30.436788 env[1186]: time="2025-05-10T00:49:30.436696177Z" level=error msg="Failed to destroy network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.437518 env[1186]: time="2025-05-10T00:49:30.437451734Z" level=error msg="encountered an error cleaning up failed sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.437689 env[1186]: time="2025-05-10T00:49:30.437578099Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65b9b9f465-tvlz9,Uid:5d27ebc2-318a-4cd0-8b96-ed411e05461e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.438052 kubelet[1942]: E0510 00:49:30.437994 1942 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.438170 kubelet[1942]: E0510 00:49:30.438086 1942 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65b9b9f465-tvlz9" May 10 00:49:30.438170 kubelet[1942]: E0510 00:49:30.438131 1942 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65b9b9f465-tvlz9" May 10 00:49:30.438285 kubelet[1942]: E0510 00:49:30.438200 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65b9b9f465-tvlz9_calico-apiserver(5d27ebc2-318a-4cd0-8b96-ed411e05461e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65b9b9f465-tvlz9_calico-apiserver(5d27ebc2-318a-4cd0-8b96-ed411e05461e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65b9b9f465-tvlz9" podUID="5d27ebc2-318a-4cd0-8b96-ed411e05461e" May 10 00:49:30.458780 env[1186]: time="2025-05-10T00:49:30.458691516Z" level=error msg="Failed to destroy network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.459701 env[1186]: time="2025-05-10T00:49:30.459618783Z" level=error msg="encountered an error cleaning up failed sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.460022 env[1186]: time="2025-05-10T00:49:30.459968919Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65b9b9f465-xp854,Uid:1da4b4d0-3ee1-4926-bb82-46a685e086be,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.460646 kubelet[1942]: E0510 00:49:30.460576 1942 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.460806 kubelet[1942]: E0510 00:49:30.460679 1942 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65b9b9f465-xp854" May 10 00:49:30.460806 kubelet[1942]: E0510 00:49:30.460711 1942 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-65b9b9f465-xp854" May 10 00:49:30.460915 kubelet[1942]: E0510 00:49:30.460796 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-65b9b9f465-xp854_calico-apiserver(1da4b4d0-3ee1-4926-bb82-46a685e086be)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-65b9b9f465-xp854_calico-apiserver(1da4b4d0-3ee1-4926-bb82-46a685e086be)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65b9b9f465-xp854" podUID="1da4b4d0-3ee1-4926-bb82-46a685e086be" May 10 00:49:30.654671 kubelet[1942]: I0510 00:49:30.654630 1942 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:49:30.656081 env[1186]: time="2025-05-10T00:49:30.656016468Z" level=info msg="StopPodSandbox for \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\"" May 10 00:49:30.660494 kubelet[1942]: E0510 00:49:30.660454 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:30.672427 kubelet[1942]: I0510 00:49:30.669127 1942 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:49:30.672597 env[1186]: time="2025-05-10T00:49:30.670134697Z" level=info msg="StopPodSandbox for \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\"" May 10 00:49:30.673286 env[1186]: time="2025-05-10T00:49:30.672643687Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:49:30.683111 kubelet[1942]: I0510 00:49:30.679738 1942 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:49:30.683446 env[1186]: time="2025-05-10T00:49:30.680547002Z" level=info msg="StopPodSandbox for \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\"" May 10 00:49:30.754026 env[1186]: time="2025-05-10T00:49:30.753941534Z" level=error msg="StopPodSandbox for \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\" failed" error="failed to destroy network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.754273 kubelet[1942]: E0510 00:49:30.754210 1942 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:49:30.754350 kubelet[1942]: E0510 00:49:30.754300 1942 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b"} May 10 00:49:30.754392 kubelet[1942]: E0510 00:49:30.754377 1942 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5d27ebc2-318a-4cd0-8b96-ed411e05461e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:49:30.754466 kubelet[1942]: E0510 00:49:30.754410 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5d27ebc2-318a-4cd0-8b96-ed411e05461e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65b9b9f465-tvlz9" podUID="5d27ebc2-318a-4cd0-8b96-ed411e05461e" May 10 00:49:30.757375 env[1186]: time="2025-05-10T00:49:30.757304371Z" level=error msg="StopPodSandbox for \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\" failed" error="failed to destroy network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.757967 kubelet[1942]: E0510 00:49:30.757908 1942 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:49:30.757967 kubelet[1942]: E0510 00:49:30.757987 1942 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508"} May 10 00:49:30.758339 kubelet[1942]: E0510 00:49:30.758038 1942 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"386f41f8-cbb4-41b5-b490-165b6012419b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:49:30.758339 kubelet[1942]: E0510 00:49:30.758072 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"386f41f8-cbb4-41b5-b490-165b6012419b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c784ff45b-6hpcv" podUID="386f41f8-cbb4-41b5-b490-165b6012419b" May 10 00:49:30.787424 env[1186]: time="2025-05-10T00:49:30.787206355Z" level=error msg="StopPodSandbox for \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\" failed" error="failed to destroy network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:30.787854 kubelet[1942]: E0510 00:49:30.787769 1942 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:49:30.788030 kubelet[1942]: E0510 00:49:30.787910 1942 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d"} May 10 00:49:30.788030 kubelet[1942]: E0510 00:49:30.787996 1942 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1da4b4d0-3ee1-4926-bb82-46a685e086be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:49:30.788197 kubelet[1942]: E0510 00:49:30.788052 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1da4b4d0-3ee1-4926-bb82-46a685e086be\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-65b9b9f465-xp854" podUID="1da4b4d0-3ee1-4926-bb82-46a685e086be" May 10 00:49:30.944945 kubelet[1942]: E0510 00:49:30.943988 1942 configmap.go:193] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition May 10 00:49:30.944945 kubelet[1942]: E0510 00:49:30.944007 1942 configmap.go:193] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition May 10 00:49:30.945173 kubelet[1942]: E0510 00:49:30.945014 1942 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/6712168e-7716-472d-9f5c-721fe9599338-config-volume podName:6712168e-7716-472d-9f5c-721fe9599338 nodeName:}" failed. No retries permitted until 2025-05-10 00:49:31.444118975 +0000 UTC m=+24.259692105 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/6712168e-7716-472d-9f5c-721fe9599338-config-volume") pod "coredns-6f6b679f8f-wsjx2" (UID: "6712168e-7716-472d-9f5c-721fe9599338") : failed to sync configmap cache: timed out waiting for the condition May 10 00:49:30.945173 kubelet[1942]: E0510 00:49:30.945093 1942 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/658c528b-9320-4600-9e74-e5919a8d11ff-config-volume podName:658c528b-9320-4600-9e74-e5919a8d11ff nodeName:}" failed. No retries permitted until 2025-05-10 00:49:31.445067762 +0000 UTC m=+24.260640876 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/658c528b-9320-4600-9e74-e5919a8d11ff-config-volume") pod "coredns-6f6b679f8f-cvd85" (UID: "658c528b-9320-4600-9e74-e5919a8d11ff") : failed to sync configmap cache: timed out waiting for the condition May 10 00:49:31.517249 systemd[1]: Created slice kubepods-besteffort-pod76ed2555_08dd_48f1_8481_5c17a11b0064.slice. May 10 00:49:31.520411 env[1186]: time="2025-05-10T00:49:31.520354084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7qrf9,Uid:76ed2555-08dd-48f1-8481-5c17a11b0064,Namespace:calico-system,Attempt:0,}" May 10 00:49:31.578077 kubelet[1942]: E0510 00:49:31.577262 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:31.579218 env[1186]: time="2025-05-10T00:49:31.579153847Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wsjx2,Uid:6712168e-7716-472d-9f5c-721fe9599338,Namespace:kube-system,Attempt:0,}" May 10 00:49:31.651780 kubelet[1942]: E0510 00:49:31.651617 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:31.652907 env[1186]: time="2025-05-10T00:49:31.652773606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-cvd85,Uid:658c528b-9320-4600-9e74-e5919a8d11ff,Namespace:kube-system,Attempt:0,}" May 10 00:49:31.688252 env[1186]: time="2025-05-10T00:49:31.688165867Z" level=error msg="Failed to destroy network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.690547 env[1186]: time="2025-05-10T00:49:31.690462181Z" level=error msg="encountered an error cleaning up failed sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.690750 env[1186]: time="2025-05-10T00:49:31.690555908Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7qrf9,Uid:76ed2555-08dd-48f1-8481-5c17a11b0064,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.694249 kubelet[1942]: E0510 00:49:31.694174 1942 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.694913 kubelet[1942]: E0510 00:49:31.694336 1942 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7qrf9" May 10 00:49:31.694913 kubelet[1942]: E0510 00:49:31.694396 1942 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7qrf9" May 10 00:49:31.694913 kubelet[1942]: E0510 00:49:31.694507 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7qrf9_calico-system(76ed2555-08dd-48f1-8481-5c17a11b0064)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7qrf9_calico-system(76ed2555-08dd-48f1-8481-5c17a11b0064)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7qrf9" podUID="76ed2555-08dd-48f1-8481-5c17a11b0064" May 10 00:49:31.706961 env[1186]: time="2025-05-10T00:49:31.706876515Z" level=error msg="Failed to destroy network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.707573 env[1186]: time="2025-05-10T00:49:31.707490519Z" level=error msg="encountered an error cleaning up failed sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.707679 env[1186]: time="2025-05-10T00:49:31.707607856Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wsjx2,Uid:6712168e-7716-472d-9f5c-721fe9599338,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.708048 kubelet[1942]: E0510 00:49:31.707986 1942 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.708136 kubelet[1942]: E0510 00:49:31.708084 1942 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-wsjx2" May 10 00:49:31.708183 kubelet[1942]: E0510 00:49:31.708137 1942 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-wsjx2" May 10 00:49:31.708551 kubelet[1942]: E0510 00:49:31.708215 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-wsjx2_kube-system(6712168e-7716-472d-9f5c-721fe9599338)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-wsjx2_kube-system(6712168e-7716-472d-9f5c-721fe9599338)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wsjx2" podUID="6712168e-7716-472d-9f5c-721fe9599338" May 10 00:49:31.768880 env[1186]: time="2025-05-10T00:49:31.768082458Z" level=error msg="Failed to destroy network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.769116 env[1186]: time="2025-05-10T00:49:31.769038516Z" level=error msg="encountered an error cleaning up failed sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.769188 env[1186]: time="2025-05-10T00:49:31.769145955Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-cvd85,Uid:658c528b-9320-4600-9e74-e5919a8d11ff,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.769997 kubelet[1942]: E0510 00:49:31.769520 1942 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:31.769997 kubelet[1942]: E0510 00:49:31.769670 1942 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-cvd85" May 10 00:49:31.769997 kubelet[1942]: E0510 00:49:31.769692 1942 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-cvd85" May 10 00:49:31.770188 kubelet[1942]: E0510 00:49:31.769757 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-cvd85_kube-system(658c528b-9320-4600-9e74-e5919a8d11ff)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-cvd85_kube-system(658c528b-9320-4600-9e74-e5919a8d11ff)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-cvd85" podUID="658c528b-9320-4600-9e74-e5919a8d11ff" May 10 00:49:31.820095 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f-shm.mount: Deactivated successfully. May 10 00:49:31.820201 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94-shm.mount: Deactivated successfully. May 10 00:49:31.862794 kubelet[1942]: I0510 00:49:31.862568 1942 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:49:31.863113 kubelet[1942]: E0510 00:49:31.863066 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:31.914000 audit[2908]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:31.914000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe79c0ea50 a2=0 a3=7ffe79c0ea3c items=0 ppid=2062 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:31.914000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:31.919000 audit[2908]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2908 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:31.919000 audit[2908]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe79c0ea50 a2=0 a3=7ffe79c0ea3c items=0 ppid=2062 pid=2908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:31.919000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:32.698778 kubelet[1942]: I0510 00:49:32.697942 1942 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:49:32.700542 env[1186]: time="2025-05-10T00:49:32.700436802Z" level=info msg="StopPodSandbox for \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\"" May 10 00:49:32.720779 kubelet[1942]: I0510 00:49:32.719479 1942 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:49:32.721776 env[1186]: time="2025-05-10T00:49:32.721689652Z" level=info msg="StopPodSandbox for \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\"" May 10 00:49:32.731394 kubelet[1942]: I0510 00:49:32.730259 1942 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:49:32.732555 kubelet[1942]: E0510 00:49:32.732307 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:32.733645 env[1186]: time="2025-05-10T00:49:32.733590852Z" level=info msg="StopPodSandbox for \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\"" May 10 00:49:32.850770 env[1186]: time="2025-05-10T00:49:32.850697649Z" level=error msg="StopPodSandbox for \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\" failed" error="failed to destroy network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:32.851463 kubelet[1942]: E0510 00:49:32.851397 1942 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:49:32.851643 kubelet[1942]: E0510 00:49:32.851474 1942 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94"} May 10 00:49:32.851643 kubelet[1942]: E0510 00:49:32.851531 1942 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"76ed2555-08dd-48f1-8481-5c17a11b0064\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:49:32.851643 kubelet[1942]: E0510 00:49:32.851563 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"76ed2555-08dd-48f1-8481-5c17a11b0064\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7qrf9" podUID="76ed2555-08dd-48f1-8481-5c17a11b0064" May 10 00:49:32.859067 env[1186]: time="2025-05-10T00:49:32.858992830Z" level=error msg="StopPodSandbox for \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\" failed" error="failed to destroy network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:32.859404 kubelet[1942]: E0510 00:49:32.859310 1942 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:49:32.859404 kubelet[1942]: E0510 00:49:32.859386 1942 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f"} May 10 00:49:32.859574 kubelet[1942]: E0510 00:49:32.859441 1942 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"6712168e-7716-472d-9f5c-721fe9599338\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:49:32.859574 kubelet[1942]: E0510 00:49:32.859478 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"6712168e-7716-472d-9f5c-721fe9599338\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-wsjx2" podUID="6712168e-7716-472d-9f5c-721fe9599338" May 10 00:49:32.898141 env[1186]: time="2025-05-10T00:49:32.898043033Z" level=error msg="StopPodSandbox for \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\" failed" error="failed to destroy network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:49:32.898572 kubelet[1942]: E0510 00:49:32.898464 1942 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:49:32.898572 kubelet[1942]: E0510 00:49:32.898552 1942 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25"} May 10 00:49:32.898852 kubelet[1942]: E0510 00:49:32.898619 1942 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"658c528b-9320-4600-9e74-e5919a8d11ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:49:32.898852 kubelet[1942]: E0510 00:49:32.898661 1942 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"658c528b-9320-4600-9e74-e5919a8d11ff\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-cvd85" podUID="658c528b-9320-4600-9e74-e5919a8d11ff" May 10 00:49:37.798192 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1908352383.mount: Deactivated successfully. May 10 00:49:37.842982 env[1186]: time="2025-05-10T00:49:37.842922047Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:37.844591 env[1186]: time="2025-05-10T00:49:37.844540501Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:37.846483 env[1186]: time="2025-05-10T00:49:37.846436684Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:37.847971 env[1186]: time="2025-05-10T00:49:37.847917867Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:37.848669 env[1186]: time="2025-05-10T00:49:37.848636092Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:49:37.881890 env[1186]: time="2025-05-10T00:49:37.881799160Z" level=info msg="CreateContainer within sandbox \"5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:49:37.905534 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1814235514.mount: Deactivated successfully. May 10 00:49:37.916227 env[1186]: time="2025-05-10T00:49:37.916138448Z" level=info msg="CreateContainer within sandbox \"5b32cf3170a830e97b392b2b7f9ceff7f868d5c826a7fdbe67f4d239f7505bab\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"91922a4d0c80e5d383493a8bb857e57aec5a2d8cd76827a68ff5740919b2b2c9\"" May 10 00:49:37.922640 env[1186]: time="2025-05-10T00:49:37.922368344Z" level=info msg="StartContainer for \"91922a4d0c80e5d383493a8bb857e57aec5a2d8cd76827a68ff5740919b2b2c9\"" May 10 00:49:37.952103 systemd[1]: Started cri-containerd-91922a4d0c80e5d383493a8bb857e57aec5a2d8cd76827a68ff5740919b2b2c9.scope. May 10 00:49:37.992000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.994001 kernel: kauditd_printk_skb: 40 callbacks suppressed May 10 00:49:37.994079 kernel: audit: type=1400 audit(1746838177.992:1005): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.996730 kernel: audit: type=1300 audit(1746838177.992:1005): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f2595c1ff88 items=0 ppid=2382 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:37.992000 audit[2979]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f2595c1ff88 items=0 ppid=2382 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:38.005905 kernel: audit: type=1327 audit(1746838177.992:1005): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393232613464306338306535643338333439336138626238353765 May 10 00:49:38.009792 kernel: audit: type=1400 audit(1746838177.992:1006): avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393232613464306338306535643338333439336138626238353765 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.016097 kernel: audit: type=1400 audit(1746838177.992:1006): avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.016352 kernel: audit: type=1400 audit(1746838177.992:1006): avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.016519 kernel: audit: type=1400 audit(1746838177.992:1006): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.023280 kernel: audit: type=1400 audit(1746838177.992:1006): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.031104 kernel: audit: type=1400 audit(1746838177.992:1006): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.031700 kernel: audit: type=1400 audit(1746838177.992:1006): avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:37.992000 audit: BPF prog-id=139 op=LOAD May 10 00:49:37.992000 audit[2979]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0001fca18 items=0 ppid=2382 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:37.992000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393232613464306338306535643338333439336138626238353765 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.000000 audit: BPF prog-id=140 op=LOAD May 10 00:49:38.000000 audit[2979]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0001fca68 items=0 ppid=2382 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:38.000000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393232613464306338306535643338333439336138626238353765 May 10 00:49:38.005000 audit: BPF prog-id=140 op=UNLOAD May 10 00:49:38.005000 audit: BPF prog-id=139 op=UNLOAD May 10 00:49:38.005000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { perfmon } for pid=2979 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit[2979]: AVC avc: denied { bpf } for pid=2979 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:38.005000 audit: BPF prog-id=141 op=LOAD May 10 00:49:38.005000 audit[2979]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0001fcaf8 items=0 ppid=2382 pid=2979 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:38.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931393232613464306338306535643338333439336138626238353765 May 10 00:49:38.041749 env[1186]: time="2025-05-10T00:49:38.041689028Z" level=info msg="StartContainer for \"91922a4d0c80e5d383493a8bb857e57aec5a2d8cd76827a68ff5740919b2b2c9\" returns successfully" May 10 00:49:38.148492 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:49:38.148662 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:49:38.766395 kubelet[1942]: E0510 00:49:38.766288 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:38.790533 kubelet[1942]: I0510 00:49:38.790415 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-n68fd" podStartSLOduration=1.510767715 podStartE2EDuration="19.7903889s" podCreationTimestamp="2025-05-10 00:49:19 +0000 UTC" firstStartedPulling="2025-05-10 00:49:19.570102951 +0000 UTC m=+12.385676079" lastFinishedPulling="2025-05-10 00:49:37.849724129 +0000 UTC m=+30.665297264" observedRunningTime="2025-05-10 00:49:38.787463149 +0000 UTC m=+31.603036280" watchObservedRunningTime="2025-05-10 00:49:38.7903889 +0000 UTC m=+31.605962039" May 10 00:49:39.646000 audit[3070]: AVC avc: denied { write } for pid=3070 comm="tee" name="fd" dev="proc" ino=24259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:49:39.646000 audit[3070]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8743e9f6 a2=241 a3=1b6 items=1 ppid=3054 pid=3070 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:39.646000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:49:39.646000 audit: PATH item=0 name="/dev/fd/63" inode=23320 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:39.646000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:49:39.677000 audit[3092]: AVC avc: denied { write } for pid=3092 comm="tee" name="fd" dev="proc" ino=23344 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:49:39.677000 audit[3092]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdd9583a06 a2=241 a3=1b6 items=1 ppid=3044 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:39.677000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:49:39.677000 audit: PATH item=0 name="/dev/fd/63" inode=23339 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:39.677000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:49:39.686000 audit[3089]: AVC avc: denied { write } for pid=3089 comm="tee" name="fd" dev="proc" ino=23348 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:49:39.686000 audit[3089]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe108909f5 a2=241 a3=1b6 items=1 ppid=3048 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:39.686000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:49:39.686000 audit: PATH item=0 name="/dev/fd/63" inode=24264 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:39.686000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:49:39.700000 audit[3098]: AVC avc: denied { write } for pid=3098 comm="tee" name="fd" dev="proc" ino=23361 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:49:39.700000 audit[3098]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd1e663a05 a2=241 a3=1b6 items=1 ppid=3045 pid=3098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:39.702000 audit[3109]: AVC avc: denied { write } for pid=3109 comm="tee" name="fd" dev="proc" ino=23365 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:49:39.700000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:49:39.700000 audit: PATH item=0 name="/dev/fd/63" inode=24267 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:39.700000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:49:39.702000 audit[3109]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc84075a07 a2=241 a3=1b6 items=1 ppid=3053 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:39.702000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:49:39.702000 audit: PATH item=0 name="/dev/fd/63" inode=24269 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:39.702000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:49:39.709000 audit[3112]: AVC avc: denied { write } for pid=3112 comm="tee" name="fd" dev="proc" ino=24273 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:49:39.709000 audit[3112]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd54261a05 a2=241 a3=1b6 items=1 ppid=3063 pid=3112 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:39.709000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:49:39.709000 audit: PATH item=0 name="/dev/fd/63" inode=24270 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:39.709000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:49:39.729000 audit[3114]: AVC avc: denied { write } for pid=3114 comm="tee" name="fd" dev="proc" ino=23369 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:49:39.729000 audit[3114]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeac498a05 a2=241 a3=1b6 items=1 ppid=3050 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:39.729000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:49:39.729000 audit: PATH item=0 name="/dev/fd/63" inode=23358 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:49:39.729000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:49:39.763317 kubelet[1942]: E0510 00:49:39.763270 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:39.811160 systemd[1]: run-containerd-runc-k8s.io-91922a4d0c80e5d383493a8bb857e57aec5a2d8cd76827a68ff5740919b2b2c9-runc.WzZdl2.mount: Deactivated successfully. May 10 00:49:40.149000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.149000 audit: BPF prog-id=142 op=LOAD May 10 00:49:40.149000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc8485bb10 a2=98 a3=3 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.149000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.151000 audit: BPF prog-id=142 op=UNLOAD May 10 00:49:40.151000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.151000 audit: BPF prog-id=143 op=LOAD May 10 00:49:40.151000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8485b8f0 a2=74 a3=540051 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.151000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.152000 audit: BPF prog-id=143 op=UNLOAD May 10 00:49:40.152000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.152000 audit: BPF prog-id=144 op=LOAD May 10 00:49:40.152000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8485b920 a2=94 a3=2 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.152000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.152000 audit: BPF prog-id=144 op=UNLOAD May 10 00:49:40.341000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.341000 audit: BPF prog-id=145 op=LOAD May 10 00:49:40.341000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc8485b7e0 a2=40 a3=1 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.341000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.342000 audit: BPF prog-id=145 op=UNLOAD May 10 00:49:40.342000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.342000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc8485b8b0 a2=50 a3=7ffc8485b990 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.342000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8485b7f0 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8485b820 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8485b730 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8485b840 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8485b820 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8485b810 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8485b840 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8485b820 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8485b840 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.357000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.357000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc8485b810 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.357000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.358000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc8485b880 a2=28 a3=0 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.358000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.358000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8485b630 a2=50 a3=1 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.358000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.358000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.358000 audit: BPF prog-id=146 op=LOAD May 10 00:49:40.358000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc8485b630 a2=94 a3=5 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.358000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.359000 audit: BPF prog-id=146 op=UNLOAD May 10 00:49:40.359000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc8485b6e0 a2=50 a3=1 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.359000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.359000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc8485b800 a2=4 a3=38 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.359000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.359000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.359000 audit[3173]: AVC avc: denied { confidentiality } for pid=3173 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:49:40.359000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8485b850 a2=94 a3=6 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.359000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.360000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { confidentiality } for pid=3173 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:49:40.360000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8485b000 a2=94 a3=83 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.360000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.360000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { perfmon } for pid=3173 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { bpf } for pid=3173 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.360000 audit[3173]: AVC avc: denied { confidentiality } for pid=3173 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:49:40.360000 audit[3173]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc8485b000 a2=94 a3=83 items=0 ppid=3064 pid=3173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.360000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit: BPF prog-id=147 op=LOAD May 10 00:49:40.376000 audit[3176]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdddc0920 a2=98 a3=1999999999999999 items=0 ppid=3064 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.376000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:49:40.376000 audit: BPF prog-id=147 op=UNLOAD May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit: BPF prog-id=148 op=LOAD May 10 00:49:40.376000 audit[3176]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdddc0800 a2=74 a3=ffff items=0 ppid=3064 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.376000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:49:40.376000 audit: BPF prog-id=148 op=UNLOAD May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { perfmon } for pid=3176 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit[3176]: AVC avc: denied { bpf } for pid=3176 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.376000 audit: BPF prog-id=149 op=LOAD May 10 00:49:40.376000 audit[3176]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffdddc0840 a2=40 a3=7fffdddc0a20 items=0 ppid=3064 pid=3176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.376000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:49:40.376000 audit: BPF prog-id=149 op=UNLOAD May 10 00:49:40.492373 systemd-networkd[1000]: vxlan.calico: Link UP May 10 00:49:40.492384 systemd-networkd[1000]: vxlan.calico: Gained carrier May 10 00:49:40.526000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.526000 audit: BPF prog-id=150 op=LOAD May 10 00:49:40.526000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffccf6990b0 a2=98 a3=ffffffff items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.526000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.526000 audit: BPF prog-id=150 op=UNLOAD May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit: BPF prog-id=151 op=LOAD May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffccf698ec0 a2=74 a3=540051 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit: BPF prog-id=151 op=UNLOAD May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit: BPF prog-id=152 op=LOAD May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffccf698ef0 a2=94 a3=2 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit: BPF prog-id=152 op=UNLOAD May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffccf698dc0 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccf698df0 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccf698d00 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffccf698e10 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffccf698df0 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffccf698de0 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffccf698e10 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccf698df0 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccf698e10 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffccf698de0 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffccf698e50 a2=28 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.528000 audit: BPF prog-id=153 op=LOAD May 10 00:49:40.528000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffccf698cc0 a2=40 a3=0 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.528000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.528000 audit: BPF prog-id=153 op=UNLOAD May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffccf698cb0 a2=50 a3=2800 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.529000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffccf698cb0 a2=50 a3=2800 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.529000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit: BPF prog-id=154 op=LOAD May 10 00:49:40.529000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffccf6984d0 a2=94 a3=2 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.529000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.529000 audit: BPF prog-id=154 op=UNLOAD May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.529000 audit: BPF prog-id=155 op=LOAD May 10 00:49:40.529000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffccf6985d0 a2=94 a3=30 items=0 ppid=3064 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.529000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.536000 audit: BPF prog-id=156 op=LOAD May 10 00:49:40.536000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff92ed3ae0 a2=98 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.536000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.538000 audit: BPF prog-id=156 op=UNLOAD May 10 00:49:40.538000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit: BPF prog-id=157 op=LOAD May 10 00:49:40.538000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff92ed38c0 a2=74 a3=540051 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.538000 audit: BPF prog-id=157 op=UNLOAD May 10 00:49:40.538000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.538000 audit: BPF prog-id=158 op=LOAD May 10 00:49:40.538000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff92ed38f0 a2=94 a3=2 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.538000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.538000 audit: BPF prog-id=158 op=UNLOAD May 10 00:49:40.686000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.686000 audit: BPF prog-id=159 op=LOAD May 10 00:49:40.686000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff92ed37b0 a2=40 a3=1 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.686000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.689000 audit: BPF prog-id=159 op=UNLOAD May 10 00:49:40.689000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.689000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff92ed3880 a2=50 a3=7fff92ed3960 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.702000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.702000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff92ed37c0 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.702000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.703000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.703000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff92ed37f0 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.703000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.703000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff92ed3700 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.703000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.703000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff92ed3810 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.703000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.703000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff92ed37f0 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.703000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.703000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff92ed37e0 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.703000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.704000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.704000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff92ed3810 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.704000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.704000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff92ed37f0 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.704000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.704000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff92ed3810 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.704000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.704000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff92ed37e0 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.704000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff92ed3850 a2=28 a3=0 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff92ed3600 a2=50 a3=1 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.705000 audit: BPF prog-id=160 op=LOAD May 10 00:49:40.705000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff92ed3600 a2=94 a3=5 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.705000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.706000 audit: BPF prog-id=160 op=UNLOAD May 10 00:49:40.706000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff92ed36b0 a2=50 a3=1 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff92ed37d0 a2=4 a3=38 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.706000 audit[3209]: AVC avc: denied { confidentiality } for pid=3209 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:49:40.706000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff92ed3820 a2=94 a3=6 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.706000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { confidentiality } for pid=3209 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:49:40.708000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff92ed2fd0 a2=94 a3=83 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.708000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.708000 audit[3209]: AVC avc: denied { confidentiality } for pid=3209 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:49:40.708000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff92ed2fd0 a2=94 a3=83 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.708000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.710000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.710000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff92ed4a10 a2=10 a3=f1f00800 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.710000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.710000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff92ed48b0 a2=10 a3=3 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.710000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.710000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff92ed4850 a2=10 a3=3 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.710000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.711000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:40.711000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff92ed4850 a2=10 a3=7 items=0 ppid=3064 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.711000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:49:40.719000 audit: BPF prog-id=155 op=UNLOAD May 10 00:49:40.764491 kubelet[1942]: E0510 00:49:40.764379 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:40.795068 systemd[1]: run-containerd-runc-k8s.io-91922a4d0c80e5d383493a8bb857e57aec5a2d8cd76827a68ff5740919b2b2c9-runc.PIVOTu.mount: Deactivated successfully. May 10 00:49:40.875000 audit[3257]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3257 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:40.875000 audit[3257]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff3dd02b80 a2=0 a3=7fff3dd02b6c items=0 ppid=3064 pid=3257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.875000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:40.888000 audit[3258]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3258 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:40.888000 audit[3258]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc33c0a9e0 a2=0 a3=7ffc33c0a9cc items=0 ppid=3064 pid=3258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.888000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:40.891000 audit[3256]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=3256 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:40.891000 audit[3256]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc2802d4e0 a2=0 a3=7ffc2802d4cc items=0 ppid=3064 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.891000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:40.894000 audit[3260]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3260 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:40.894000 audit[3260]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff44034f80 a2=0 a3=7fff44034f6c items=0 ppid=3064 pid=3260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:40.894000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:42.481801 systemd-networkd[1000]: vxlan.calico: Gained IPv6LL May 10 00:49:42.511068 env[1186]: time="2025-05-10T00:49:42.510996590Z" level=info msg="StopPodSandbox for \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\"" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.594 [INFO][3283] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.595 [INFO][3283] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" iface="eth0" netns="/var/run/netns/cni-77b9478e-7e08-c4cf-b49a-bffa6feff024" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.595 [INFO][3283] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" iface="eth0" netns="/var/run/netns/cni-77b9478e-7e08-c4cf-b49a-bffa6feff024" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.596 [INFO][3283] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" iface="eth0" netns="/var/run/netns/cni-77b9478e-7e08-c4cf-b49a-bffa6feff024" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.596 [INFO][3283] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.596 [INFO][3283] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.735 [INFO][3290] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.738 [INFO][3290] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.738 [INFO][3290] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.751 [WARNING][3290] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.751 [INFO][3290] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.754 [INFO][3290] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:42.760032 env[1186]: 2025-05-10 00:49:42.756 [INFO][3283] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:49:42.763858 systemd[1]: run-netns-cni\x2d77b9478e\x2d7e08\x2dc4cf\x2db49a\x2dbffa6feff024.mount: Deactivated successfully. May 10 00:49:42.765165 env[1186]: time="2025-05-10T00:49:42.764648156Z" level=info msg="TearDown network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\" successfully" May 10 00:49:42.765165 env[1186]: time="2025-05-10T00:49:42.764696030Z" level=info msg="StopPodSandbox for \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\" returns successfully" May 10 00:49:42.768897 env[1186]: time="2025-05-10T00:49:42.768214440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c784ff45b-6hpcv,Uid:386f41f8-cbb4-41b5-b490-165b6012419b,Namespace:calico-system,Attempt:1,}" May 10 00:49:42.988952 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:49:42.989206 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid577cf5fae4: link becomes ready May 10 00:49:42.991817 systemd-networkd[1000]: calid577cf5fae4: Link UP May 10 00:49:42.992204 systemd-networkd[1000]: calid577cf5fae4: Gained carrier May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.838 [INFO][3297] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0 calico-kube-controllers-c784ff45b- calico-system 386f41f8-cbb4-41b5-b490-165b6012419b 765 0 2025-05-10 00:49:19 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:c784ff45b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.7-n-7542157996 calico-kube-controllers-c784ff45b-6hpcv eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid577cf5fae4 [] []}} ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Namespace="calico-system" Pod="calico-kube-controllers-c784ff45b-6hpcv" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.839 [INFO][3297] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Namespace="calico-system" Pod="calico-kube-controllers-c784ff45b-6hpcv" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.886 [INFO][3310] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" HandleID="k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.904 [INFO][3310] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" HandleID="k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031ca40), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-7542157996", "pod":"calico-kube-controllers-c784ff45b-6hpcv", "timestamp":"2025-05-10 00:49:42.886106777 +0000 UTC"}, Hostname:"ci-3510.3.7-n-7542157996", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.904 [INFO][3310] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.904 [INFO][3310] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.904 [INFO][3310] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-7542157996' May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.910 [INFO][3310] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.920 [INFO][3310] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.941 [INFO][3310] ipam/ipam.go 489: Trying affinity for 192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.946 [INFO][3310] ipam/ipam.go 155: Attempting to load block cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.950 [INFO][3310] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.950 [INFO][3310] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.953 [INFO][3310] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.962 [INFO][3310] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.973 [INFO][3310] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.35.129/26] block=192.168.35.128/26 handle="k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.973 [INFO][3310] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.129/26] handle="k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.973 [INFO][3310] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:43.029782 env[1186]: 2025-05-10 00:49:42.973 [INFO][3310] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.129/26] IPv6=[] ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" HandleID="k8s-pod-network.acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:43.031116 env[1186]: 2025-05-10 00:49:42.976 [INFO][3297] cni-plugin/k8s.go 386: Populated endpoint ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Namespace="calico-system" Pod="calico-kube-controllers-c784ff45b-6hpcv" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0", GenerateName:"calico-kube-controllers-c784ff45b-", Namespace:"calico-system", SelfLink:"", UID:"386f41f8-cbb4-41b5-b490-165b6012419b", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c784ff45b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"", Pod:"calico-kube-controllers-c784ff45b-6hpcv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid577cf5fae4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:43.031116 env[1186]: 2025-05-10 00:49:42.977 [INFO][3297] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.35.129/32] ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Namespace="calico-system" Pod="calico-kube-controllers-c784ff45b-6hpcv" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:43.031116 env[1186]: 2025-05-10 00:49:42.977 [INFO][3297] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid577cf5fae4 ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Namespace="calico-system" Pod="calico-kube-controllers-c784ff45b-6hpcv" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:43.031116 env[1186]: 2025-05-10 00:49:42.988 [INFO][3297] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Namespace="calico-system" Pod="calico-kube-controllers-c784ff45b-6hpcv" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:43.031116 env[1186]: 2025-05-10 00:49:43.002 [INFO][3297] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Namespace="calico-system" Pod="calico-kube-controllers-c784ff45b-6hpcv" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0", GenerateName:"calico-kube-controllers-c784ff45b-", Namespace:"calico-system", SelfLink:"", UID:"386f41f8-cbb4-41b5-b490-165b6012419b", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c784ff45b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a", Pod:"calico-kube-controllers-c784ff45b-6hpcv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid577cf5fae4", MAC:"fe:39:6a:eb:d0:c3", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:43.031116 env[1186]: 2025-05-10 00:49:43.020 [INFO][3297] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a" Namespace="calico-system" Pod="calico-kube-controllers-c784ff45b-6hpcv" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:49:43.046804 env[1186]: time="2025-05-10T00:49:43.046679789Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:43.047023 env[1186]: time="2025-05-10T00:49:43.046887451Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:43.047023 env[1186]: time="2025-05-10T00:49:43.046936361Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:43.047278 env[1186]: time="2025-05-10T00:49:43.047195722Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a pid=3336 runtime=io.containerd.runc.v2 May 10 00:49:43.069642 kernel: kauditd_printk_skb: 548 callbacks suppressed May 10 00:49:43.069823 kernel: audit: type=1325 audit(1746838183.066:1113): table=filter:101 family=2 entries=34 op=nft_register_chain pid=3348 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:43.066000 audit[3348]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=3348 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:43.066000 audit[3348]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe28e46f80 a2=0 a3=7ffe28e46f6c items=0 ppid=3064 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.084320 kernel: audit: type=1300 audit(1746838183.066:1113): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe28e46f80 a2=0 a3=7ffe28e46f6c items=0 ppid=3064 pid=3348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.089306 kernel: audit: type=1327 audit(1746838183.066:1113): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:43.066000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:43.094401 systemd[1]: Started cri-containerd-acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a.scope. May 10 00:49:43.119533 kernel: audit: type=1400 audit(1746838183.110:1114): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119774 kernel: audit: type=1400 audit(1746838183.110:1115): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119829 kernel: audit: type=1400 audit(1746838183.110:1116): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.126903 kernel: audit: type=1400 audit(1746838183.110:1117): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.127647 kernel: audit: type=1400 audit(1746838183.110:1118): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.127697 kernel: audit: type=1400 audit(1746838183.110:1119): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.133928 kernel: audit: type=1400 audit(1746838183.110:1120): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.110000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit: BPF prog-id=161 op=LOAD May 10 00:49:43.113000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3336 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643737386436353965393366626137303934373134323739643361 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3336 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643737386436353965393366626137303934373134323739643361 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.113000 audit: BPF prog-id=162 op=LOAD May 10 00:49:43.113000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002fc600 items=0 ppid=3336 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643737386436353965393366626137303934373134323739643361 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.116000 audit: BPF prog-id=163 op=LOAD May 10 00:49:43.116000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002fc648 items=0 ppid=3336 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643737386436353965393366626137303934373134323739643361 May 10 00:49:43.119000 audit: BPF prog-id=163 op=UNLOAD May 10 00:49:43.119000 audit: BPF prog-id=162 op=UNLOAD May 10 00:49:43.119000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { perfmon } for pid=3346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit[3346]: AVC avc: denied { bpf } for pid=3346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.119000 audit: BPF prog-id=164 op=LOAD May 10 00:49:43.119000 audit[3346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002fca58 items=0 ppid=3336 pid=3346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163643737386436353965393366626137303934373134323739643361 May 10 00:49:43.168064 env[1186]: time="2025-05-10T00:49:43.168015686Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c784ff45b-6hpcv,Uid:386f41f8-cbb4-41b5-b490-165b6012419b,Namespace:calico-system,Attempt:1,} returns sandbox id \"acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a\"" May 10 00:49:43.172761 env[1186]: time="2025-05-10T00:49:43.172437077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:49:43.510534 env[1186]: time="2025-05-10T00:49:43.510466480Z" level=info msg="StopPodSandbox for \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\"" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.595 [INFO][3386] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.595 [INFO][3386] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" iface="eth0" netns="/var/run/netns/cni-7defd621-4165-6b50-103f-a7f965c687cb" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.595 [INFO][3386] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" iface="eth0" netns="/var/run/netns/cni-7defd621-4165-6b50-103f-a7f965c687cb" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.596 [INFO][3386] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" iface="eth0" netns="/var/run/netns/cni-7defd621-4165-6b50-103f-a7f965c687cb" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.596 [INFO][3386] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.596 [INFO][3386] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.628 [INFO][3393] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.628 [INFO][3393] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.628 [INFO][3393] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.637 [WARNING][3393] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.637 [INFO][3393] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.639 [INFO][3393] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:43.644057 env[1186]: 2025-05-10 00:49:43.641 [INFO][3386] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:49:43.645140 env[1186]: time="2025-05-10T00:49:43.644448584Z" level=info msg="TearDown network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\" successfully" May 10 00:49:43.645140 env[1186]: time="2025-05-10T00:49:43.644508223Z" level=info msg="StopPodSandbox for \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\" returns successfully" May 10 00:49:43.646514 env[1186]: time="2025-05-10T00:49:43.646427983Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65b9b9f465-xp854,Uid:1da4b4d0-3ee1-4926-bb82-46a685e086be,Namespace:calico-apiserver,Attempt:1,}" May 10 00:49:43.764605 systemd[1]: run-containerd-runc-k8s.io-acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a-runc.je5vt6.mount: Deactivated successfully. May 10 00:49:43.764760 systemd[1]: run-netns-cni\x2d7defd621\x2d4165\x2d6b50\x2d103f\x2da7f965c687cb.mount: Deactivated successfully. May 10 00:49:43.819813 systemd-networkd[1000]: cali200a0a9ca39: Link UP May 10 00:49:43.821937 systemd-networkd[1000]: cali200a0a9ca39: Gained carrier May 10 00:49:43.822290 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali200a0a9ca39: link becomes ready May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.699 [INFO][3400] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0 calico-apiserver-65b9b9f465- calico-apiserver 1da4b4d0-3ee1-4926-bb82-46a685e086be 772 0 2025-05-10 00:49:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65b9b9f465 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-7542157996 calico-apiserver-65b9b9f465-xp854 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali200a0a9ca39 [] []}} ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-xp854" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.699 [INFO][3400] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-xp854" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.741 [INFO][3415] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" HandleID="k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.755 [INFO][3415] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" HandleID="k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000305cd0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-7542157996", "pod":"calico-apiserver-65b9b9f465-xp854", "timestamp":"2025-05-10 00:49:43.741428073 +0000 UTC"}, Hostname:"ci-3510.3.7-n-7542157996", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.755 [INFO][3415] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.755 [INFO][3415] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.755 [INFO][3415] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-7542157996' May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.759 [INFO][3415] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.773 [INFO][3415] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.781 [INFO][3415] ipam/ipam.go 489: Trying affinity for 192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.784 [INFO][3415] ipam/ipam.go 155: Attempting to load block cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.788 [INFO][3415] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.788 [INFO][3415] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.791 [INFO][3415] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.797 [INFO][3415] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.807 [INFO][3415] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.35.130/26] block=192.168.35.128/26 handle="k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.807 [INFO][3415] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.130/26] handle="k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" host="ci-3510.3.7-n-7542157996" May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.807 [INFO][3415] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:43.845385 env[1186]: 2025-05-10 00:49:43.807 [INFO][3415] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.130/26] IPv6=[] ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" HandleID="k8s-pod-network.166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.846614 env[1186]: 2025-05-10 00:49:43.814 [INFO][3400] cni-plugin/k8s.go 386: Populated endpoint ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-xp854" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0", GenerateName:"calico-apiserver-65b9b9f465-", Namespace:"calico-apiserver", SelfLink:"", UID:"1da4b4d0-3ee1-4926-bb82-46a685e086be", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65b9b9f465", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"", Pod:"calico-apiserver-65b9b9f465-xp854", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali200a0a9ca39", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:43.846614 env[1186]: 2025-05-10 00:49:43.815 [INFO][3400] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.35.130/32] ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-xp854" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.846614 env[1186]: 2025-05-10 00:49:43.815 [INFO][3400] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali200a0a9ca39 ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-xp854" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.846614 env[1186]: 2025-05-10 00:49:43.822 [INFO][3400] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-xp854" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.846614 env[1186]: 2025-05-10 00:49:43.823 [INFO][3400] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-xp854" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0", GenerateName:"calico-apiserver-65b9b9f465-", Namespace:"calico-apiserver", SelfLink:"", UID:"1da4b4d0-3ee1-4926-bb82-46a685e086be", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65b9b9f465", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f", Pod:"calico-apiserver-65b9b9f465-xp854", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali200a0a9ca39", MAC:"aa:44:34:1e:56:16", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:43.846614 env[1186]: 2025-05-10 00:49:43.842 [INFO][3400] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-xp854" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:49:43.870000 audit[3438]: NETFILTER_CFG table=filter:102 family=2 entries=44 op=nft_register_chain pid=3438 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:43.870000 audit[3438]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffef1e9dab0 a2=0 a3=7ffef1e9da9c items=0 ppid=3064 pid=3438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.870000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:43.878218 env[1186]: time="2025-05-10T00:49:43.878124731Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:43.878513 env[1186]: time="2025-05-10T00:49:43.878180012Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:43.878513 env[1186]: time="2025-05-10T00:49:43.878200365Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:43.884876 env[1186]: time="2025-05-10T00:49:43.878653381Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f pid=3443 runtime=io.containerd.runc.v2 May 10 00:49:43.911436 systemd[1]: run-containerd-runc-k8s.io-166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f-runc.BYImO7.mount: Deactivated successfully. May 10 00:49:43.916928 systemd[1]: Started cri-containerd-166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f.scope. May 10 00:49:43.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.931000 audit: BPF prog-id=165 op=LOAD May 10 00:49:43.933000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136366130366633656463306534303137633638396132313832363030 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136366130366633656463306534303137633638396132313832363030 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.933000 audit: BPF prog-id=166 op=LOAD May 10 00:49:43.933000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002198a0 items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136366130366633656463306534303137633638396132313832363030 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.935000 audit: BPF prog-id=167 op=LOAD May 10 00:49:43.935000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002198e8 items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136366130366633656463306534303137633638396132313832363030 May 10 00:49:43.936000 audit: BPF prog-id=167 op=UNLOAD May 10 00:49:43.936000 audit: BPF prog-id=166 op=UNLOAD May 10 00:49:43.937000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { perfmon } for pid=3453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit[3453]: AVC avc: denied { bpf } for pid=3453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:43.937000 audit: BPF prog-id=168 op=LOAD May 10 00:49:43.937000 audit[3453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000219cf8 items=0 ppid=3443 pid=3453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:43.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136366130366633656463306534303137633638396132313832363030 May 10 00:49:43.982227 env[1186]: time="2025-05-10T00:49:43.982157037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65b9b9f465-xp854,Uid:1da4b4d0-3ee1-4926-bb82-46a685e086be,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f\"" May 10 00:49:44.509716 env[1186]: time="2025-05-10T00:49:44.509637796Z" level=info msg="StopPodSandbox for \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\"" May 10 00:49:44.658351 systemd-networkd[1000]: calid577cf5fae4: Gained IPv6LL May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.612 [INFO][3492] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.612 [INFO][3492] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" iface="eth0" netns="/var/run/netns/cni-f4f16141-5e31-1bcb-cef6-7b0d8e775595" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.614 [INFO][3492] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" iface="eth0" netns="/var/run/netns/cni-f4f16141-5e31-1bcb-cef6-7b0d8e775595" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.614 [INFO][3492] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" iface="eth0" netns="/var/run/netns/cni-f4f16141-5e31-1bcb-cef6-7b0d8e775595" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.614 [INFO][3492] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.614 [INFO][3492] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.652 [INFO][3499] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.652 [INFO][3499] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.652 [INFO][3499] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.670 [WARNING][3499] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.670 [INFO][3499] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.673 [INFO][3499] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:44.677747 env[1186]: 2025-05-10 00:49:44.675 [INFO][3492] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:49:44.678807 env[1186]: time="2025-05-10T00:49:44.677990166Z" level=info msg="TearDown network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\" successfully" May 10 00:49:44.678807 env[1186]: time="2025-05-10T00:49:44.678034281Z" level=info msg="StopPodSandbox for \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\" returns successfully" May 10 00:49:44.679608 env[1186]: time="2025-05-10T00:49:44.679561887Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7qrf9,Uid:76ed2555-08dd-48f1-8481-5c17a11b0064,Namespace:calico-system,Attempt:1,}" May 10 00:49:44.764607 systemd[1]: run-netns-cni\x2df4f16141\x2d5e31\x2d1bcb\x2dcef6\x2d7b0d8e775595.mount: Deactivated successfully. May 10 00:49:44.909860 systemd-networkd[1000]: cali12e4b66880a: Link UP May 10 00:49:44.912112 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:49:44.912437 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali12e4b66880a: link becomes ready May 10 00:49:44.912725 systemd-networkd[1000]: cali12e4b66880a: Gained carrier May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.744 [INFO][3505] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0 csi-node-driver- calico-system 76ed2555-08dd-48f1-8481-5c17a11b0064 781 0 2025-05-10 00:49:19 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.7-n-7542157996 csi-node-driver-7qrf9 eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali12e4b66880a [] []}} ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Namespace="calico-system" Pod="csi-node-driver-7qrf9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.745 [INFO][3505] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Namespace="calico-system" Pod="csi-node-driver-7qrf9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.819 [INFO][3518] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" HandleID="k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.834 [INFO][3518] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" HandleID="k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00033cd10), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.7-n-7542157996", "pod":"csi-node-driver-7qrf9", "timestamp":"2025-05-10 00:49:44.815834932 +0000 UTC"}, Hostname:"ci-3510.3.7-n-7542157996", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.834 [INFO][3518] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.834 [INFO][3518] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.834 [INFO][3518] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-7542157996' May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.839 [INFO][3518] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.847 [INFO][3518] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.857 [INFO][3518] ipam/ipam.go 489: Trying affinity for 192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.862 [INFO][3518] ipam/ipam.go 155: Attempting to load block cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.868 [INFO][3518] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.868 [INFO][3518] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.872 [INFO][3518] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9 May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.886 [INFO][3518] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.898 [INFO][3518] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.35.131/26] block=192.168.35.128/26 handle="k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.898 [INFO][3518] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.131/26] handle="k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" host="ci-3510.3.7-n-7542157996" May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.898 [INFO][3518] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:44.948225 env[1186]: 2025-05-10 00:49:44.898 [INFO][3518] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.131/26] IPv6=[] ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" HandleID="k8s-pod-network.7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.949599 env[1186]: 2025-05-10 00:49:44.901 [INFO][3505] cni-plugin/k8s.go 386: Populated endpoint ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Namespace="calico-system" Pod="csi-node-driver-7qrf9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"76ed2555-08dd-48f1-8481-5c17a11b0064", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"", Pod:"csi-node-driver-7qrf9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali12e4b66880a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:44.949599 env[1186]: 2025-05-10 00:49:44.901 [INFO][3505] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.35.131/32] ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Namespace="calico-system" Pod="csi-node-driver-7qrf9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.949599 env[1186]: 2025-05-10 00:49:44.901 [INFO][3505] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali12e4b66880a ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Namespace="calico-system" Pod="csi-node-driver-7qrf9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.949599 env[1186]: 2025-05-10 00:49:44.912 [INFO][3505] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Namespace="calico-system" Pod="csi-node-driver-7qrf9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.949599 env[1186]: 2025-05-10 00:49:44.915 [INFO][3505] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Namespace="calico-system" Pod="csi-node-driver-7qrf9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"76ed2555-08dd-48f1-8481-5c17a11b0064", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9", Pod:"csi-node-driver-7qrf9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali12e4b66880a", MAC:"da:35:13:93:4d:d8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:44.949599 env[1186]: 2025-05-10 00:49:44.944 [INFO][3505] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9" Namespace="calico-system" Pod="csi-node-driver-7qrf9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:49:44.970000 audit[3533]: NETFILTER_CFG table=filter:103 family=2 entries=38 op=nft_register_chain pid=3533 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:44.970000 audit[3533]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffc9f3f96b0 a2=0 a3=7ffc9f3f969c items=0 ppid=3064 pid=3533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:44.970000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:45.026980 env[1186]: time="2025-05-10T00:49:45.026760047Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:45.027320 env[1186]: time="2025-05-10T00:49:45.027262446Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:45.027512 env[1186]: time="2025-05-10T00:49:45.027475086Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:45.030205 env[1186]: time="2025-05-10T00:49:45.029973171Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9 pid=3547 runtime=io.containerd.runc.v2 May 10 00:49:45.061402 systemd[1]: Started cri-containerd-7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9.scope. May 10 00:49:45.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.101000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.101000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.102000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.102000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.102000 audit: BPF prog-id=169 op=LOAD May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3547 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:45.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356236623035653639646533323237326465326537643037613563 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3547 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:45.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356236623035653639646533323237326465326537643037613563 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit: BPF prog-id=170 op=LOAD May 10 00:49:45.103000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000167c40 items=0 ppid=3547 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:45.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356236623035653639646533323237326465326537643037613563 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit: BPF prog-id=171 op=LOAD May 10 00:49:45.103000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000167c88 items=0 ppid=3547 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:45.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356236623035653639646533323237326465326537643037613563 May 10 00:49:45.103000 audit: BPF prog-id=171 op=UNLOAD May 10 00:49:45.103000 audit: BPF prog-id=170 op=UNLOAD May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { perfmon } for pid=3558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit[3558]: AVC avc: denied { bpf } for pid=3558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:45.103000 audit: BPF prog-id=172 op=LOAD May 10 00:49:45.103000 audit[3558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c00039e098 items=0 ppid=3547 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:45.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764356236623035653639646533323237326465326537643037613563 May 10 00:49:45.129665 env[1186]: time="2025-05-10T00:49:45.129596598Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7qrf9,Uid:76ed2555-08dd-48f1-8481-5c17a11b0064,Namespace:calico-system,Attempt:1,} returns sandbox id \"7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9\"" May 10 00:49:45.490341 systemd-networkd[1000]: cali200a0a9ca39: Gained IPv6LL May 10 00:49:45.511756 env[1186]: time="2025-05-10T00:49:45.511552149Z" level=info msg="StopPodSandbox for \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\"" May 10 00:49:45.527499 env[1186]: time="2025-05-10T00:49:45.527423717Z" level=info msg="StopPodSandbox for \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\"" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.654 [INFO][3612] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.654 [INFO][3612] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" iface="eth0" netns="/var/run/netns/cni-a5dffc49-149d-55d3-9150-427cad65b0f2" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.654 [INFO][3612] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" iface="eth0" netns="/var/run/netns/cni-a5dffc49-149d-55d3-9150-427cad65b0f2" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.655 [INFO][3612] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" iface="eth0" netns="/var/run/netns/cni-a5dffc49-149d-55d3-9150-427cad65b0f2" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.655 [INFO][3612] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.655 [INFO][3612] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.758 [INFO][3629] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.764 [INFO][3629] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.764 [INFO][3629] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.781 [WARNING][3629] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.781 [INFO][3629] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.789 [INFO][3629] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:45.809146 env[1186]: 2025-05-10 00:49:45.799 [INFO][3612] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:49:45.807769 systemd[1]: run-netns-cni\x2da5dffc49\x2d149d\x2d55d3\x2d9150\x2d427cad65b0f2.mount: Deactivated successfully. May 10 00:49:45.811713 env[1186]: time="2025-05-10T00:49:45.809354362Z" level=info msg="TearDown network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\" successfully" May 10 00:49:45.811713 env[1186]: time="2025-05-10T00:49:45.809422469Z" level=info msg="StopPodSandbox for \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\" returns successfully" May 10 00:49:45.815757 kubelet[1942]: E0510 00:49:45.815700 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:45.819773 env[1186]: time="2025-05-10T00:49:45.817088452Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-cvd85,Uid:658c528b-9320-4600-9e74-e5919a8d11ff,Namespace:kube-system,Attempt:1,}" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.690 [INFO][3617] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.691 [INFO][3617] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" iface="eth0" netns="/var/run/netns/cni-dbdc4358-ce2e-80e1-ed9e-df75ea4efcfe" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.693 [INFO][3617] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" iface="eth0" netns="/var/run/netns/cni-dbdc4358-ce2e-80e1-ed9e-df75ea4efcfe" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.695 [INFO][3617] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" iface="eth0" netns="/var/run/netns/cni-dbdc4358-ce2e-80e1-ed9e-df75ea4efcfe" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.695 [INFO][3617] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.695 [INFO][3617] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.829 [INFO][3635] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.829 [INFO][3635] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.829 [INFO][3635] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.864 [WARNING][3635] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.864 [INFO][3635] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.867 [INFO][3635] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:45.876676 env[1186]: 2025-05-10 00:49:45.872 [INFO][3617] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:49:45.882412 systemd[1]: run-netns-cni\x2ddbdc4358\x2dce2e\x2d80e1\x2ded9e\x2ddf75ea4efcfe.mount: Deactivated successfully. May 10 00:49:45.883426 env[1186]: time="2025-05-10T00:49:45.883363686Z" level=info msg="TearDown network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\" successfully" May 10 00:49:45.883662 env[1186]: time="2025-05-10T00:49:45.883615768Z" level=info msg="StopPodSandbox for \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\" returns successfully" May 10 00:49:45.885998 kubelet[1942]: E0510 00:49:45.885922 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:45.888397 env[1186]: time="2025-05-10T00:49:45.888319170Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wsjx2,Uid:6712168e-7716-472d-9f5c-721fe9599338,Namespace:kube-system,Attempt:1,}" May 10 00:49:46.129335 env[1186]: time="2025-05-10T00:49:46.128090133Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:46.135648 env[1186]: time="2025-05-10T00:49:46.135546859Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:46.143124 env[1186]: time="2025-05-10T00:49:46.143060939Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:46.145730 env[1186]: time="2025-05-10T00:49:46.144554981Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:49:46.146435 env[1186]: time="2025-05-10T00:49:46.146027211Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:46.158050 env[1186]: time="2025-05-10T00:49:46.157827496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:49:46.174973 env[1186]: time="2025-05-10T00:49:46.174894863Z" level=info msg="CreateContainer within sandbox \"acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:49:46.215758 env[1186]: time="2025-05-10T00:49:46.215667139Z" level=info msg="CreateContainer within sandbox \"acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"067df371e51014953c7562ffac5cb0dde475c76a9f6930803cc818b3f833e7bc\"" May 10 00:49:46.217213 env[1186]: time="2025-05-10T00:49:46.217152391Z" level=info msg="StartContainer for \"067df371e51014953c7562ffac5cb0dde475c76a9f6930803cc818b3f833e7bc\"" May 10 00:49:46.235021 systemd-networkd[1000]: calib689ec99fdd: Link UP May 10 00:49:46.244327 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:49:46.244517 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib689ec99fdd: link becomes ready May 10 00:49:46.245127 systemd-networkd[1000]: calib689ec99fdd: Gained carrier May 10 00:49:46.279115 systemd[1]: Started cri-containerd-067df371e51014953c7562ffac5cb0dde475c76a9f6930803cc818b3f833e7bc.scope. May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:45.975 [INFO][3643] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0 coredns-6f6b679f8f- kube-system 658c528b-9320-4600-9e74-e5919a8d11ff 790 0 2025-05-10 00:49:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-7542157996 coredns-6f6b679f8f-cvd85 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib689ec99fdd [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Namespace="kube-system" Pod="coredns-6f6b679f8f-cvd85" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:45.975 [INFO][3643] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Namespace="kube-system" Pod="coredns-6f6b679f8f-cvd85" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.102 [INFO][3673] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" HandleID="k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.132 [INFO][3673] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" HandleID="k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003131b0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-7542157996", "pod":"coredns-6f6b679f8f-cvd85", "timestamp":"2025-05-10 00:49:46.10256972 +0000 UTC"}, Hostname:"ci-3510.3.7-n-7542157996", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.132 [INFO][3673] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.132 [INFO][3673] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.132 [INFO][3673] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-7542157996' May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.137 [INFO][3673] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.151 [INFO][3673] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.169 [INFO][3673] ipam/ipam.go 489: Trying affinity for 192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.174 [INFO][3673] ipam/ipam.go 155: Attempting to load block cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.184 [INFO][3673] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.184 [INFO][3673] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.188 [INFO][3673] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8 May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.196 [INFO][3673] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.208 [INFO][3673] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.35.132/26] block=192.168.35.128/26 handle="k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.208 [INFO][3673] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.132/26] handle="k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.208 [INFO][3673] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:46.289465 env[1186]: 2025-05-10 00:49:46.209 [INFO][3673] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.132/26] IPv6=[] ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" HandleID="k8s-pod-network.2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:46.290806 env[1186]: 2025-05-10 00:49:46.212 [INFO][3643] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Namespace="kube-system" Pod="coredns-6f6b679f8f-cvd85" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"658c528b-9320-4600-9e74-e5919a8d11ff", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"", Pod:"coredns-6f6b679f8f-cvd85", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib689ec99fdd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:46.290806 env[1186]: 2025-05-10 00:49:46.214 [INFO][3643] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.35.132/32] ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Namespace="kube-system" Pod="coredns-6f6b679f8f-cvd85" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:46.290806 env[1186]: 2025-05-10 00:49:46.216 [INFO][3643] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib689ec99fdd ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Namespace="kube-system" Pod="coredns-6f6b679f8f-cvd85" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:46.290806 env[1186]: 2025-05-10 00:49:46.253 [INFO][3643] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Namespace="kube-system" Pod="coredns-6f6b679f8f-cvd85" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:46.290806 env[1186]: 2025-05-10 00:49:46.254 [INFO][3643] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Namespace="kube-system" Pod="coredns-6f6b679f8f-cvd85" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"658c528b-9320-4600-9e74-e5919a8d11ff", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8", Pod:"coredns-6f6b679f8f-cvd85", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib689ec99fdd", MAC:"b2:f0:c2:c2:5e:8c", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:46.290806 env[1186]: 2025-05-10 00:49:46.275 [INFO][3643] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8" Namespace="kube-system" Pod="coredns-6f6b679f8f-cvd85" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:49:46.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.316000 audit[3729]: NETFILTER_CFG table=filter:104 family=2 entries=46 op=nft_register_chain pid=3729 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:46.316000 audit[3729]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffe5c7c0e40 a2=0 a3=7ffe5c7c0e2c items=0 ppid=3064 pid=3729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.316000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:46.317000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.317000 audit: BPF prog-id=173 op=LOAD May 10 00:49:46.319000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.319000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3336 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376466333731653531303134393533633735363266666163356362 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3336 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376466333731653531303134393533633735363266666163356362 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.320000 audit: BPF prog-id=174 op=LOAD May 10 00:49:46.320000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000287900 items=0 ppid=3336 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.320000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376466333731653531303134393533633735363266666163356362 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.321000 audit: BPF prog-id=175 op=LOAD May 10 00:49:46.321000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000287948 items=0 ppid=3336 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376466333731653531303134393533633735363266666163356362 May 10 00:49:46.322000 audit: BPF prog-id=175 op=UNLOAD May 10 00:49:46.323000 audit: BPF prog-id=174 op=UNLOAD May 10 00:49:46.323000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.323000 audit: BPF prog-id=176 op=LOAD May 10 00:49:46.323000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000287d58 items=0 ppid=3336 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.323000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036376466333731653531303134393533633735363266666163356362 May 10 00:49:46.330146 env[1186]: time="2025-05-10T00:49:46.329871386Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:46.330146 env[1186]: time="2025-05-10T00:49:46.329934249Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:46.330146 env[1186]: time="2025-05-10T00:49:46.329945104Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:46.331709 env[1186]: time="2025-05-10T00:49:46.330144265Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8 pid=3736 runtime=io.containerd.runc.v2 May 10 00:49:46.358777 systemd[1]: Started cri-containerd-2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8.scope. May 10 00:49:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.394000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.394000 audit: BPF prog-id=177 op=LOAD May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3736 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623334366139643564313666366333646431626264643163613736 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3736 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623334366139643564313666366333646431626264643163613736 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit: BPF prog-id=178 op=LOAD May 10 00:49:46.403000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000282b80 items=0 ppid=3736 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623334366139643564313666366333646431626264643163613736 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.403000 audit: BPF prog-id=179 op=LOAD May 10 00:49:46.403000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000282bc8 items=0 ppid=3736 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.403000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623334366139643564313666366333646431626264643163613736 May 10 00:49:46.403000 audit: BPF prog-id=179 op=UNLOAD May 10 00:49:46.403000 audit: BPF prog-id=178 op=UNLOAD May 10 00:49:46.404000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { perfmon } for pid=3744 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit[3744]: AVC avc: denied { bpf } for pid=3744 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.404000 audit: BPF prog-id=180 op=LOAD May 10 00:49:46.404000 audit[3744]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000282fd8 items=0 ppid=3736 pid=3744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266623334366139643564313666366333646431626264643163613736 May 10 00:49:46.418581 env[1186]: time="2025-05-10T00:49:46.418505439Z" level=info msg="StartContainer for \"067df371e51014953c7562ffac5cb0dde475c76a9f6930803cc818b3f833e7bc\" returns successfully" May 10 00:49:46.469405 systemd-networkd[1000]: cali592954a3d3d: Link UP May 10 00:49:46.481465 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali592954a3d3d: link becomes ready May 10 00:49:46.479965 systemd-networkd[1000]: cali592954a3d3d: Gained carrier May 10 00:49:46.513495 env[1186]: time="2025-05-10T00:49:46.513408846Z" level=info msg="StopPodSandbox for \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\"" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.065 [INFO][3659] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0 coredns-6f6b679f8f- kube-system 6712168e-7716-472d-9f5c-721fe9599338 791 0 2025-05-10 00:49:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.7-n-7542157996 coredns-6f6b679f8f-wsjx2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali592954a3d3d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wsjx2" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.065 [INFO][3659] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wsjx2" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.237 [INFO][3681] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" HandleID="k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.379 [INFO][3681] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" HandleID="k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312b50), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.7-n-7542157996", "pod":"coredns-6f6b679f8f-wsjx2", "timestamp":"2025-05-10 00:49:46.237340459 +0000 UTC"}, Hostname:"ci-3510.3.7-n-7542157996", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.379 [INFO][3681] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.379 [INFO][3681] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.379 [INFO][3681] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-7542157996' May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.387 [INFO][3681] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.402 [INFO][3681] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.426 [INFO][3681] ipam/ipam.go 489: Trying affinity for 192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.430 [INFO][3681] ipam/ipam.go 155: Attempting to load block cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.436 [INFO][3681] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.437 [INFO][3681] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.440 [INFO][3681] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.448 [INFO][3681] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.459 [INFO][3681] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.35.133/26] block=192.168.35.128/26 handle="k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.459 [INFO][3681] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.133/26] handle="k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" host="ci-3510.3.7-n-7542157996" May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.459 [INFO][3681] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:46.515575 env[1186]: 2025-05-10 00:49:46.459 [INFO][3681] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.133/26] IPv6=[] ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" HandleID="k8s-pod-network.c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:46.516405 env[1186]: 2025-05-10 00:49:46.461 [INFO][3659] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wsjx2" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6712168e-7716-472d-9f5c-721fe9599338", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"", Pod:"coredns-6f6b679f8f-wsjx2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali592954a3d3d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:46.516405 env[1186]: 2025-05-10 00:49:46.462 [INFO][3659] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.35.133/32] ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wsjx2" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:46.516405 env[1186]: 2025-05-10 00:49:46.462 [INFO][3659] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali592954a3d3d ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wsjx2" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:46.516405 env[1186]: 2025-05-10 00:49:46.480 [INFO][3659] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wsjx2" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:46.516405 env[1186]: 2025-05-10 00:49:46.489 [INFO][3659] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wsjx2" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6712168e-7716-472d-9f5c-721fe9599338", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d", Pod:"coredns-6f6b679f8f-wsjx2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali592954a3d3d", MAC:"ea:84:0c:a6:28:92", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:46.516405 env[1186]: 2025-05-10 00:49:46.510 [INFO][3659] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d" Namespace="kube-system" Pod="coredns-6f6b679f8f-wsjx2" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:49:46.522173 env[1186]: time="2025-05-10T00:49:46.522060449Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-cvd85,Uid:658c528b-9320-4600-9e74-e5919a8d11ff,Namespace:kube-system,Attempt:1,} returns sandbox id \"2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8\"" May 10 00:49:46.525935 kubelet[1942]: E0510 00:49:46.525848 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:46.528780 env[1186]: time="2025-05-10T00:49:46.528729931Z" level=info msg="CreateContainer within sandbox \"2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:49:46.563122 env[1186]: time="2025-05-10T00:49:46.562182847Z" level=info msg="CreateContainer within sandbox \"2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0895353303ce06a468e89166baa85f90032829851b2705a4a5a71b49c28cea1d\"" May 10 00:49:46.563866 env[1186]: time="2025-05-10T00:49:46.563818745Z" level=info msg="StartContainer for \"0895353303ce06a468e89166baa85f90032829851b2705a4a5a71b49c28cea1d\"" May 10 00:49:46.582000 audit[3822]: NETFILTER_CFG table=filter:105 family=2 entries=42 op=nft_register_chain pid=3822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:46.582000 audit[3822]: SYSCALL arch=c000003e syscall=46 success=yes exit=20596 a0=3 a1=7fff176f08d0 a2=0 a3=7fff176f08bc items=0 ppid=3064 pid=3822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:46.603279 env[1186]: time="2025-05-10T00:49:46.600497332Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:46.603279 env[1186]: time="2025-05-10T00:49:46.600640173Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:46.603279 env[1186]: time="2025-05-10T00:49:46.600689827Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:46.603279 env[1186]: time="2025-05-10T00:49:46.601014814Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d pid=3817 runtime=io.containerd.runc.v2 May 10 00:49:46.647909 systemd[1]: Started cri-containerd-0895353303ce06a468e89166baa85f90032829851b2705a4a5a71b49c28cea1d.scope. May 10 00:49:46.673021 systemd[1]: Started cri-containerd-c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d.scope. May 10 00:49:46.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.716000 audit: BPF prog-id=181 op=LOAD May 10 00:49:46.718000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3817 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331356432663135386135306237313030376265363731303362363633 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3817 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331356432663135386135306237313030376265363731303362363633 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.718000 audit: BPF prog-id=182 op=LOAD May 10 00:49:46.718000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00034e360 items=0 ppid=3817 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331356432663135386135306237313030376265363731303362363633 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.719000 audit: BPF prog-id=183 op=LOAD May 10 00:49:46.719000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00034e3a8 items=0 ppid=3817 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331356432663135386135306237313030376265363731303362363633 May 10 00:49:46.721000 audit: BPF prog-id=183 op=UNLOAD May 10 00:49:46.721000 audit: BPF prog-id=182 op=UNLOAD May 10 00:49:46.721000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { perfmon } for pid=3842 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit[3842]: AVC avc: denied { bpf } for pid=3842 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.721000 audit: BPF prog-id=184 op=LOAD May 10 00:49:46.721000 audit[3842]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00034e7b8 items=0 ppid=3817 pid=3842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331356432663135386135306237313030376265363731303362363633 May 10 00:49:46.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.731000 audit: BPF prog-id=185 op=LOAD May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3736 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393533353333303363653036613436386538393136366261613835 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3736 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393533353333303363653036613436386538393136366261613835 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit: BPF prog-id=186 op=LOAD May 10 00:49:46.732000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015f690 items=0 ppid=3736 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393533353333303363653036613436386538393136366261613835 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit: BPF prog-id=187 op=LOAD May 10 00:49:46.732000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00015f6d8 items=0 ppid=3736 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393533353333303363653036613436386538393136366261613835 May 10 00:49:46.732000 audit: BPF prog-id=187 op=UNLOAD May 10 00:49:46.732000 audit: BPF prog-id=186 op=UNLOAD May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { perfmon } for pid=3833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit[3833]: AVC avc: denied { bpf } for pid=3833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:46.732000 audit: BPF prog-id=188 op=LOAD May 10 00:49:46.732000 audit[3833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00015fae8 items=0 ppid=3736 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:46.732000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038393533353333303363653036613436386538393136366261613835 May 10 00:49:46.781711 env[1186]: time="2025-05-10T00:49:46.781626071Z" level=info msg="StartContainer for \"0895353303ce06a468e89166baa85f90032829851b2705a4a5a71b49c28cea1d\" returns successfully" May 10 00:49:46.825568 kubelet[1942]: E0510 00:49:46.825527 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.738 [INFO][3815] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.739 [INFO][3815] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" iface="eth0" netns="/var/run/netns/cni-a5a2e3d1-88c7-47a9-f540-3f0054e52bc4" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.739 [INFO][3815] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" iface="eth0" netns="/var/run/netns/cni-a5a2e3d1-88c7-47a9-f540-3f0054e52bc4" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.740 [INFO][3815] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" iface="eth0" netns="/var/run/netns/cni-a5a2e3d1-88c7-47a9-f540-3f0054e52bc4" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.740 [INFO][3815] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.740 [INFO][3815] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.830 [INFO][3873] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.831 [INFO][3873] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.831 [INFO][3873] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.851 [WARNING][3873] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.851 [INFO][3873] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.855 [INFO][3873] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:46.860797 env[1186]: 2025-05-10 00:49:46.857 [INFO][3815] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:49:46.863981 systemd[1]: run-netns-cni\x2da5a2e3d1\x2d88c7\x2d47a9\x2df540\x2d3f0054e52bc4.mount: Deactivated successfully. May 10 00:49:46.873489 env[1186]: time="2025-05-10T00:49:46.873393715Z" level=info msg="TearDown network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\" successfully" May 10 00:49:46.873809 env[1186]: time="2025-05-10T00:49:46.873775264Z" level=info msg="StopPodSandbox for \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\" returns successfully" May 10 00:49:46.875697 env[1186]: time="2025-05-10T00:49:46.875648115Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65b9b9f465-tvlz9,Uid:5d27ebc2-318a-4cd0-8b96-ed411e05461e,Namespace:calico-apiserver,Attempt:1,}" May 10 00:49:46.882251 env[1186]: time="2025-05-10T00:49:46.882177064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-wsjx2,Uid:6712168e-7716-472d-9f5c-721fe9599338,Namespace:kube-system,Attempt:1,} returns sandbox id \"c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d\"" May 10 00:49:46.883718 kubelet[1942]: E0510 00:49:46.883676 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:46.906504 env[1186]: time="2025-05-10T00:49:46.902589268Z" level=info msg="CreateContainer within sandbox \"c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:49:46.943149 env[1186]: time="2025-05-10T00:49:46.943066096Z" level=info msg="CreateContainer within sandbox \"c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"548392ceafb68150d2818087ec5138a9ab59ff371a00afcbcd9bf6f9f8787aa8\"" May 10 00:49:46.944654 env[1186]: time="2025-05-10T00:49:46.944600983Z" level=info msg="StartContainer for \"548392ceafb68150d2818087ec5138a9ab59ff371a00afcbcd9bf6f9f8787aa8\"" May 10 00:49:46.962413 systemd-networkd[1000]: cali12e4b66880a: Gained IPv6LL May 10 00:49:47.010315 systemd[1]: Started cri-containerd-548392ceafb68150d2818087ec5138a9ab59ff371a00afcbcd9bf6f9f8787aa8.scope. May 10 00:49:47.053229 kubelet[1942]: I0510 00:49:47.050365 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-c784ff45b-6hpcv" podStartSLOduration=25.072608227 podStartE2EDuration="28.050318118s" podCreationTimestamp="2025-05-10 00:49:19 +0000 UTC" firstStartedPulling="2025-05-10 00:49:43.171003766 +0000 UTC m=+35.986576883" lastFinishedPulling="2025-05-10 00:49:46.148713652 +0000 UTC m=+38.964286774" observedRunningTime="2025-05-10 00:49:47.041383808 +0000 UTC m=+39.856956941" watchObservedRunningTime="2025-05-10 00:49:47.050318118 +0000 UTC m=+39.865891253" May 10 00:49:47.053229 kubelet[1942]: I0510 00:49:47.052956 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-cvd85" podStartSLOduration=35.052910411 podStartE2EDuration="35.052910411s" podCreationTimestamp="2025-05-10 00:49:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:46.959529752 +0000 UTC m=+39.775102888" watchObservedRunningTime="2025-05-10 00:49:47.052910411 +0000 UTC m=+39.868483547" May 10 00:49:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.094000 audit: BPF prog-id=189 op=LOAD May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3817 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534383339326365616662363831353064323831383038376563353133 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3817 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534383339326365616662363831353064323831383038376563353133 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit: BPF prog-id=190 op=LOAD May 10 00:49:47.095000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00038d1c0 items=0 ppid=3817 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534383339326365616662363831353064323831383038376563353133 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit: BPF prog-id=191 op=LOAD May 10 00:49:47.095000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00038d208 items=0 ppid=3817 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534383339326365616662363831353064323831383038376563353133 May 10 00:49:47.095000 audit: BPF prog-id=191 op=UNLOAD May 10 00:49:47.095000 audit: BPF prog-id=190 op=UNLOAD May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { perfmon } for pid=3914 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit[3914]: AVC avc: denied { bpf } for pid=3914 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.095000 audit: BPF prog-id=192 op=LOAD May 10 00:49:47.095000 audit[3914]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00038d618 items=0 ppid=3817 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.095000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534383339326365616662363831353064323831383038376563353133 May 10 00:49:47.131359 env[1186]: time="2025-05-10T00:49:47.131067740Z" level=info msg="StartContainer for \"548392ceafb68150d2818087ec5138a9ab59ff371a00afcbcd9bf6f9f8787aa8\" returns successfully" May 10 00:49:47.166000 audit[3945]: NETFILTER_CFG table=filter:106 family=2 entries=16 op=nft_register_rule pid=3945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:47.166000 audit[3945]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffca317ffd0 a2=0 a3=7ffca317ffbc items=0 ppid=2062 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.166000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:47.171000 audit[3945]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=3945 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:47.171000 audit[3945]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffca317ffd0 a2=0 a3=0 items=0 ppid=2062 pid=3945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:47.196603 systemd-networkd[1000]: cali830b082c575: Link UP May 10 00:49:47.202280 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali830b082c575: link becomes ready May 10 00:49:47.201494 systemd-networkd[1000]: cali830b082c575: Gained carrier May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.020 [INFO][3895] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0 calico-apiserver-65b9b9f465- calico-apiserver 5d27ebc2-318a-4cd0-8b96-ed411e05461e 811 0 2025-05-10 00:49:18 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:65b9b9f465 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.7-n-7542157996 calico-apiserver-65b9b9f465-tvlz9 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali830b082c575 [] []}} ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-tvlz9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.020 [INFO][3895] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-tvlz9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.088 [INFO][3926] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" HandleID="k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.115 [INFO][3926] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" HandleID="k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004c06c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.7-n-7542157996", "pod":"calico-apiserver-65b9b9f465-tvlz9", "timestamp":"2025-05-10 00:49:47.088897913 +0000 UTC"}, Hostname:"ci-3510.3.7-n-7542157996", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.115 [INFO][3926] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.116 [INFO][3926] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.116 [INFO][3926] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.7-n-7542157996' May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.125 [INFO][3926] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.133 [INFO][3926] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.142 [INFO][3926] ipam/ipam.go 489: Trying affinity for 192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.146 [INFO][3926] ipam/ipam.go 155: Attempting to load block cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.151 [INFO][3926] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.35.128/26 host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.151 [INFO][3926] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.35.128/26 handle="k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.154 [INFO][3926] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.163 [INFO][3926] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.35.128/26 handle="k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.178 [INFO][3926] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.35.134/26] block=192.168.35.128/26 handle="k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.178 [INFO][3926] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.35.134/26] handle="k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" host="ci-3510.3.7-n-7542157996" May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.178 [INFO][3926] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:49:47.229613 env[1186]: 2025-05-10 00:49:47.178 [INFO][3926] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.35.134/26] IPv6=[] ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" HandleID="k8s-pod-network.41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:47.230474 env[1186]: 2025-05-10 00:49:47.182 [INFO][3895] cni-plugin/k8s.go 386: Populated endpoint ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-tvlz9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0", GenerateName:"calico-apiserver-65b9b9f465-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d27ebc2-318a-4cd0-8b96-ed411e05461e", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65b9b9f465", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"", Pod:"calico-apiserver-65b9b9f465-tvlz9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali830b082c575", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:47.230474 env[1186]: 2025-05-10 00:49:47.185 [INFO][3895] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.35.134/32] ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-tvlz9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:47.230474 env[1186]: 2025-05-10 00:49:47.185 [INFO][3895] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali830b082c575 ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-tvlz9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:47.230474 env[1186]: 2025-05-10 00:49:47.204 [INFO][3895] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-tvlz9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:47.230474 env[1186]: 2025-05-10 00:49:47.204 [INFO][3895] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-tvlz9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0", GenerateName:"calico-apiserver-65b9b9f465-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d27ebc2-318a-4cd0-8b96-ed411e05461e", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65b9b9f465", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f", Pod:"calico-apiserver-65b9b9f465-tvlz9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali830b082c575", MAC:"e6:e4:b8:2e:5b:7c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:49:47.230474 env[1186]: 2025-05-10 00:49:47.226 [INFO][3895] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f" Namespace="calico-apiserver" Pod="calico-apiserver-65b9b9f465-tvlz9" WorkloadEndpoint="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:49:47.262468 env[1186]: time="2025-05-10T00:49:47.262318985Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:49:47.262468 env[1186]: time="2025-05-10T00:49:47.262406782Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:49:47.262468 env[1186]: time="2025-05-10T00:49:47.262437672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:49:47.263286 env[1186]: time="2025-05-10T00:49:47.263202428Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f pid=3969 runtime=io.containerd.runc.v2 May 10 00:49:47.284668 systemd[1]: Started cri-containerd-41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f.scope. May 10 00:49:47.332000 audit[4001]: NETFILTER_CFG table=filter:108 family=2 entries=50 op=nft_register_chain pid=4001 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:49:47.332000 audit[4001]: SYSCALL arch=c000003e syscall=46 success=yes exit=25080 a0=3 a1=7ffc41a000b0 a2=0 a3=7ffc41a0009c items=0 ppid=3064 pid=4001 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.332000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:49:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.337000 audit: BPF prog-id=193 op=LOAD May 10 00:49:47.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3969 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653535343963373761336337633532333134353534666561633731 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3969 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653535343963373761336337633532333134353534666561633731 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.338000 audit: BPF prog-id=194 op=LOAD May 10 00:49:47.338000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000227cd0 items=0 ppid=3969 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653535343963373761336337633532333134353534666561633731 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit: BPF prog-id=195 op=LOAD May 10 00:49:47.339000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000227d18 items=0 ppid=3969 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653535343963373761336337633532333134353534666561633731 May 10 00:49:47.339000 audit: BPF prog-id=195 op=UNLOAD May 10 00:49:47.339000 audit: BPF prog-id=194 op=UNLOAD May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { perfmon } for pid=3981 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit[3981]: AVC avc: denied { bpf } for pid=3981 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:47.339000 audit: BPF prog-id=196 op=LOAD May 10 00:49:47.339000 audit[3981]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038e128 items=0 ppid=3969 pid=3981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:47.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431653535343963373761336337633532333134353534666561633731 May 10 00:49:47.400080 env[1186]: time="2025-05-10T00:49:47.399828647Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-65b9b9f465-tvlz9,Uid:5d27ebc2-318a-4cd0-8b96-ed411e05461e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f\"" May 10 00:49:47.810932 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3455271266.mount: Deactivated successfully. May 10 00:49:47.842188 kubelet[1942]: E0510 00:49:47.842139 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:47.844903 kubelet[1942]: E0510 00:49:47.844857 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:47.849098 kubelet[1942]: I0510 00:49:47.849044 1942 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:49:47.875863 kubelet[1942]: I0510 00:49:47.875795 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-wsjx2" podStartSLOduration=35.875766539 podStartE2EDuration="35.875766539s" podCreationTimestamp="2025-05-10 00:49:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:49:47.870603545 +0000 UTC m=+40.686176679" watchObservedRunningTime="2025-05-10 00:49:47.875766539 +0000 UTC m=+40.691339671" May 10 00:49:47.921554 systemd-networkd[1000]: calib689ec99fdd: Gained IPv6LL May 10 00:49:47.922029 systemd-networkd[1000]: cali592954a3d3d: Gained IPv6LL May 10 00:49:48.013000 audit[4010]: NETFILTER_CFG table=filter:109 family=2 entries=16 op=nft_register_rule pid=4010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:48.013000 audit[4010]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc828d5350 a2=0 a3=7ffc828d533c items=0 ppid=2062 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:48.013000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:48.017000 audit[4010]: NETFILTER_CFG table=nat:110 family=2 entries=14 op=nft_register_rule pid=4010 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:48.017000 audit[4010]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc828d5350 a2=0 a3=0 items=0 ppid=2062 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:48.017000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:48.845265 kubelet[1942]: E0510 00:49:48.844913 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:48.848535 kubelet[1942]: E0510 00:49:48.846817 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:49.040989 kernel: kauditd_printk_skb: 533 callbacks suppressed May 10 00:49:49.041325 kernel: audit: type=1325 audit(1746838189.036:1285): table=filter:111 family=2 entries=13 op=nft_register_rule pid=4012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:49.036000 audit[4012]: NETFILTER_CFG table=filter:111 family=2 entries=13 op=nft_register_rule pid=4012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:49.036000 audit[4012]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff0814c8c0 a2=0 a3=7fff0814c8ac items=0 ppid=2062 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.051275 kernel: audit: type=1300 audit(1746838189.036:1285): arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff0814c8c0 a2=0 a3=7fff0814c8ac items=0 ppid=2062 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.036000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:49.055282 kernel: audit: type=1327 audit(1746838189.036:1285): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:49.064000 audit[4012]: NETFILTER_CFG table=nat:112 family=2 entries=47 op=nft_register_chain pid=4012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:49.068415 kernel: audit: type=1325 audit(1746838189.064:1286): table=nat:112 family=2 entries=47 op=nft_register_chain pid=4012 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:49.073284 kernel: audit: type=1300 audit(1746838189.064:1286): arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff0814c8c0 a2=0 a3=7fff0814c8ac items=0 ppid=2062 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.064000 audit[4012]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff0814c8c0 a2=0 a3=7fff0814c8ac items=0 ppid=2062 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.064000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:49.076289 kernel: audit: type=1327 audit(1746838189.064:1286): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:49.143514 env[1186]: time="2025-05-10T00:49:49.143344129Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:49.145850 env[1186]: time="2025-05-10T00:49:49.145784424Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:49.148928 env[1186]: time="2025-05-10T00:49:49.148863400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:49.151635 env[1186]: time="2025-05-10T00:49:49.151574105Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:49.155306 env[1186]: time="2025-05-10T00:49:49.153851641Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:49:49.163467 env[1186]: time="2025-05-10T00:49:49.163386314Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:49:49.165638 env[1186]: time="2025-05-10T00:49:49.165561910Z" level=info msg="CreateContainer within sandbox \"166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:49:49.201277 env[1186]: time="2025-05-10T00:49:49.200936064Z" level=info msg="CreateContainer within sandbox \"166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"22477e64ebd3bb96c11fb25230c8c0c79925c160f135c0eb37d63560955a3ce9\"" May 10 00:49:49.202532 env[1186]: time="2025-05-10T00:49:49.202480314Z" level=info msg="StartContainer for \"22477e64ebd3bb96c11fb25230c8c0c79925c160f135c0eb37d63560955a3ce9\"" May 10 00:49:49.212363 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1731847214.mount: Deactivated successfully. May 10 00:49:49.267916 systemd-networkd[1000]: cali830b082c575: Gained IPv6LL May 10 00:49:49.292472 systemd[1]: run-containerd-runc-k8s.io-22477e64ebd3bb96c11fb25230c8c0c79925c160f135c0eb37d63560955a3ce9-runc.ONDvnP.mount: Deactivated successfully. May 10 00:49:49.296601 systemd[1]: Started cri-containerd-22477e64ebd3bb96c11fb25230c8c0c79925c160f135c0eb37d63560955a3ce9.scope. May 10 00:49:49.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394653 kernel: audit: type=1400 audit(1746838189.389:1287): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394845 kernel: audit: type=1400 audit(1746838189.390:1288): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394910 kernel: audit: type=1400 audit(1746838189.390:1289): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.401449 kernel: audit: type=1400 audit(1746838189.390:1290): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit: BPF prog-id=197 op=LOAD May 10 00:49:49.392000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3443 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343737653634656264336262393663313166623235323330633863 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3443 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343737653634656264336262393663313166623235323330633863 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.392000 audit: BPF prog-id=198 op=LOAD May 10 00:49:49.392000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000230b90 items=0 ppid=3443 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343737653634656264336262393663313166623235323330633863 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.394000 audit: BPF prog-id=199 op=LOAD May 10 00:49:49.394000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000230bd8 items=0 ppid=3443 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343737653634656264336262393663313166623235323330633863 May 10 00:49:49.396000 audit: BPF prog-id=199 op=UNLOAD May 10 00:49:49.396000 audit: BPF prog-id=198 op=UNLOAD May 10 00:49:49.396000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { perfmon } for pid=4021 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit[4021]: AVC avc: denied { bpf } for pid=4021 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:49.396000 audit: BPF prog-id=200 op=LOAD May 10 00:49:49.396000 audit[4021]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000230fe8 items=0 ppid=3443 pid=4021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232343737653634656264336262393663313166623235323330633863 May 10 00:49:49.453437 env[1186]: time="2025-05-10T00:49:49.453343532Z" level=info msg="StartContainer for \"22477e64ebd3bb96c11fb25230c8c0c79925c160f135c0eb37d63560955a3ce9\" returns successfully" May 10 00:49:49.859663 kubelet[1942]: E0510 00:49:49.858781 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:49.859663 kubelet[1942]: E0510 00:49:49.859524 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:49.894842 kubelet[1942]: I0510 00:49:49.894752 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65b9b9f465-xp854" podStartSLOduration=26.718131651 podStartE2EDuration="31.894707852s" podCreationTimestamp="2025-05-10 00:49:18 +0000 UTC" firstStartedPulling="2025-05-10 00:49:43.984620097 +0000 UTC m=+36.800193215" lastFinishedPulling="2025-05-10 00:49:49.161196286 +0000 UTC m=+41.976769416" observedRunningTime="2025-05-10 00:49:49.893068997 +0000 UTC m=+42.708642133" watchObservedRunningTime="2025-05-10 00:49:49.894707852 +0000 UTC m=+42.710280988" May 10 00:49:49.929000 audit[4052]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:49.929000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff215f5f50 a2=0 a3=7fff215f5f3c items=0 ppid=2062 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.929000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:49.937000 audit[4052]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4052 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:49.937000 audit[4052]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff215f5f50 a2=0 a3=7fff215f5f3c items=0 ppid=2062 pid=4052 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:49.937000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:50.551224 env[1186]: time="2025-05-10T00:49:50.551140742Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.553293 env[1186]: time="2025-05-10T00:49:50.553247604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.555507 env[1186]: time="2025-05-10T00:49:50.555460317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.558401 env[1186]: time="2025-05-10T00:49:50.558329053Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.559574 env[1186]: time="2025-05-10T00:49:50.559500483Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:49:50.562124 env[1186]: time="2025-05-10T00:49:50.562080369Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:49:50.566834 env[1186]: time="2025-05-10T00:49:50.566758090Z" level=info msg="CreateContainer within sandbox \"7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:49:50.592231 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3929360088.mount: Deactivated successfully. May 10 00:49:50.599843 env[1186]: time="2025-05-10T00:49:50.599768110Z" level=info msg="CreateContainer within sandbox \"7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"1365cfeb9c7d000d0b71356360c543855cfb26b12c923dc37237a655ee5c140e\"" May 10 00:49:50.601337 env[1186]: time="2025-05-10T00:49:50.601271151Z" level=info msg="StartContainer for \"1365cfeb9c7d000d0b71356360c543855cfb26b12c923dc37237a655ee5c140e\"" May 10 00:49:50.662379 systemd[1]: Started cri-containerd-1365cfeb9c7d000d0b71356360c543855cfb26b12c923dc37237a655ee5c140e.scope. May 10 00:49:50.683449 systemd[1]: run-containerd-runc-k8s.io-1365cfeb9c7d000d0b71356360c543855cfb26b12c923dc37237a655ee5c140e-runc.4i7tp3.mount: Deactivated successfully. May 10 00:49:50.716000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.716000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe5c82cdcb8 items=0 ppid=3547 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:50.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363563666562396337643030306430623731333536333630633534 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.717000 audit: BPF prog-id=201 op=LOAD May 10 00:49:50.717000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b5cc8 items=0 ppid=3547 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:50.717000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363563666562396337643030306430623731333536333630633534 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.718000 audit: BPF prog-id=202 op=LOAD May 10 00:49:50.718000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b5d18 items=0 ppid=3547 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:50.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363563666562396337643030306430623731333536333630633534 May 10 00:49:50.718000 audit: BPF prog-id=202 op=UNLOAD May 10 00:49:50.719000 audit: BPF prog-id=201 op=UNLOAD May 10 00:49:50.719000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:50.719000 audit: BPF prog-id=203 op=LOAD May 10 00:49:50.719000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b5da8 items=0 ppid=3547 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:50.719000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133363563666562396337643030306430623731333536333630633534 May 10 00:49:50.742078 env[1186]: time="2025-05-10T00:49:50.742018667Z" level=info msg="StartContainer for \"1365cfeb9c7d000d0b71356360c543855cfb26b12c923dc37237a655ee5c140e\" returns successfully" May 10 00:49:50.864750 kubelet[1942]: I0510 00:49:50.863281 1942 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:49:50.943846 env[1186]: time="2025-05-10T00:49:50.943770618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.945996 env[1186]: time="2025-05-10T00:49:50.945933956Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.948397 env[1186]: time="2025-05-10T00:49:50.948342552Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.951943 env[1186]: time="2025-05-10T00:49:50.951874390Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:49:50.952352 env[1186]: time="2025-05-10T00:49:50.952311620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:50.957723 env[1186]: time="2025-05-10T00:49:50.957656922Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:49:50.958817 env[1186]: time="2025-05-10T00:49:50.958763867Z" level=info msg="CreateContainer within sandbox \"41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:49:50.971216 env[1186]: time="2025-05-10T00:49:50.971140492Z" level=info msg="CreateContainer within sandbox \"41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"c66bea4049da939d7507c5aa97b393d67529d0caee1d6735d75a3dec76722940\"" May 10 00:49:50.973051 env[1186]: time="2025-05-10T00:49:50.972531002Z" level=info msg="StartContainer for \"c66bea4049da939d7507c5aa97b393d67529d0caee1d6735d75a3dec76722940\"" May 10 00:49:51.001218 systemd[1]: Started cri-containerd-c66bea4049da939d7507c5aa97b393d67529d0caee1d6735d75a3dec76722940.scope. May 10 00:49:51.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.044000 audit: BPF prog-id=204 op=LOAD May 10 00:49:51.045000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3969 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:51.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366265613430343964613933396437353037633561613937623339 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3969 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:51.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366265613430343964613933396437353037633561613937623339 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.045000 audit: BPF prog-id=205 op=LOAD May 10 00:49:51.045000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003304c0 items=0 ppid=3969 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:51.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366265613430343964613933396437353037633561613937623339 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit: BPF prog-id=206 op=LOAD May 10 00:49:51.046000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000330508 items=0 ppid=3969 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:51.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366265613430343964613933396437353037633561613937623339 May 10 00:49:51.046000 audit: BPF prog-id=206 op=UNLOAD May 10 00:49:51.046000 audit: BPF prog-id=205 op=UNLOAD May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { perfmon } for pid=4100 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit[4100]: AVC avc: denied { bpf } for pid=4100 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:51.046000 audit: BPF prog-id=207 op=LOAD May 10 00:49:51.046000 audit[4100]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000330918 items=0 ppid=3969 pid=4100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:51.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336366265613430343964613933396437353037633561613937623339 May 10 00:49:51.107989 env[1186]: time="2025-05-10T00:49:51.107933439Z" level=info msg="StartContainer for \"c66bea4049da939d7507c5aa97b393d67529d0caee1d6735d75a3dec76722940\" returns successfully" May 10 00:49:51.176000 audit[4033]: AVC avc: denied { watch } for pid=4033 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_49_29.2565944858/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c773,c865 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c773,c865 tclass=file permissive=0 May 10 00:49:51.176000 audit[4033]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0016f8780 a2=fc6 a3=0 items=0 ppid=3443 pid=4033 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c773,c865 key=(null) May 10 00:49:51.176000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:49:51.888088 kubelet[1942]: I0510 00:49:51.888003 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-65b9b9f465-tvlz9" podStartSLOduration=30.338646703 podStartE2EDuration="33.887977612s" podCreationTimestamp="2025-05-10 00:49:18 +0000 UTC" firstStartedPulling="2025-05-10 00:49:47.405756111 +0000 UTC m=+40.221329225" lastFinishedPulling="2025-05-10 00:49:50.95508702 +0000 UTC m=+43.770660134" observedRunningTime="2025-05-10 00:49:51.886296652 +0000 UTC m=+44.701869798" watchObservedRunningTime="2025-05-10 00:49:51.887977612 +0000 UTC m=+44.703550748" May 10 00:49:51.911000 audit[4132]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:51.911000 audit[4132]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdd3d7fc50 a2=0 a3=7ffdd3d7fc3c items=0 ppid=2062 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:51.911000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:51.917000 audit[4132]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4132 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:51.917000 audit[4132]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdd3d7fc50 a2=0 a3=7ffdd3d7fc3c items=0 ppid=2062 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:51.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:52.253000 audit[4110]: AVC avc: denied { watch } for pid=4110 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_49_29.1909163666/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c911 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c772,c911 tclass=file permissive=0 May 10 00:49:52.253000 audit[4110]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001309a40 a2=fc6 a3=0 items=0 ppid=3969 pid=4110 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c911 key=(null) May 10 00:49:52.253000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:49:52.745785 env[1186]: time="2025-05-10T00:49:52.745716198Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.749462 env[1186]: time="2025-05-10T00:49:52.749383999Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.751957 env[1186]: time="2025-05-10T00:49:52.751885843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.754468 env[1186]: time="2025-05-10T00:49:52.754397935Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:49:52.755253 env[1186]: time="2025-05-10T00:49:52.755187709Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:49:52.763229 env[1186]: time="2025-05-10T00:49:52.763158791Z" level=info msg="CreateContainer within sandbox \"7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:49:52.785222 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2405397139.mount: Deactivated successfully. May 10 00:49:52.789628 env[1186]: time="2025-05-10T00:49:52.789544588Z" level=info msg="CreateContainer within sandbox \"7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"f166937fbb2405d66ddc69067599a3dfed4d192c1ebc31f62749763aa66bdfea\"" May 10 00:49:52.793106 env[1186]: time="2025-05-10T00:49:52.793041921Z" level=info msg="StartContainer for \"f166937fbb2405d66ddc69067599a3dfed4d192c1ebc31f62749763aa66bdfea\"" May 10 00:49:52.827471 systemd[1]: Started cri-containerd-f166937fbb2405d66ddc69067599a3dfed4d192c1ebc31f62749763aa66bdfea.scope. May 10 00:49:52.847271 systemd[1]: run-containerd-runc-k8s.io-f166937fbb2405d66ddc69067599a3dfed4d192c1ebc31f62749763aa66bdfea-runc.yF4EWI.mount: Deactivated successfully. May 10 00:49:52.874000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ff94f0460a8 items=0 ppid=3547 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:52.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363639333766626232343035643636646463363930363735393961 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.874000 audit: BPF prog-id=208 op=LOAD May 10 00:49:52.874000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f8e18 items=0 ppid=3547 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:52.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363639333766626232343035643636646463363930363735393961 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit: BPF prog-id=209 op=LOAD May 10 00:49:52.875000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f8e68 items=0 ppid=3547 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:52.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363639333766626232343035643636646463363930363735393961 May 10 00:49:52.875000 audit: BPF prog-id=209 op=UNLOAD May 10 00:49:52.875000 audit: BPF prog-id=208 op=UNLOAD May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { perfmon } for pid=4143 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit[4143]: AVC avc: denied { bpf } for pid=4143 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:49:52.875000 audit: BPF prog-id=210 op=LOAD May 10 00:49:52.875000 audit[4143]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f8ef8 items=0 ppid=3547 pid=4143 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:52.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631363639333766626232343035643636646463363930363735393961 May 10 00:49:52.877806 kubelet[1942]: I0510 00:49:52.877707 1942 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:49:52.904290 env[1186]: time="2025-05-10T00:49:52.903319975Z" level=info msg="StartContainer for \"f166937fbb2405d66ddc69067599a3dfed4d192c1ebc31f62749763aa66bdfea\" returns successfully" May 10 00:49:53.330044 kubelet[1942]: E0510 00:49:53.329966 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:49:53.691566 kubelet[1942]: I0510 00:49:53.691378 1942 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:49:53.691566 kubelet[1942]: I0510 00:49:53.691483 1942 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:49:53.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-137.184.1.116:22-139.178.68.195:51518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:53.896700 systemd[1]: Started sshd@8-137.184.1.116:22-139.178.68.195:51518.service. May 10 00:49:54.047741 sshd[4200]: Accepted publickey for core from 139.178.68.195 port 51518 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:49:54.047000 audit[4200]: USER_ACCT pid=4200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.049128 kernel: kauditd_printk_skb: 215 callbacks suppressed May 10 00:49:54.049232 kernel: audit: type=1101 audit(1746838194.047:1342): pid=4200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.054000 audit[4200]: CRED_ACQ pid=4200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.059383 kernel: audit: type=1103 audit(1746838194.054:1343): pid=4200 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.062368 kernel: audit: type=1006 audit(1746838194.054:1344): pid=4200 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 10 00:49:54.054000 audit[4200]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc90598120 a2=3 a3=0 items=0 ppid=1 pid=4200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:54.054000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:49:54.068251 kernel: audit: type=1300 audit(1746838194.054:1344): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc90598120 a2=3 a3=0 items=0 ppid=1 pid=4200 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:54.068412 kernel: audit: type=1327 audit(1746838194.054:1344): proctitle=737368643A20636F7265205B707269765D May 10 00:49:54.068546 sshd[4200]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:49:54.080255 systemd[1]: Started session-8.scope. May 10 00:49:54.080351 systemd-logind[1179]: New session 8 of user core. May 10 00:49:54.092000 audit[4200]: USER_START pid=4200 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.103168 kernel: audit: type=1105 audit(1746838194.092:1345): pid=4200 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.103402 kernel: audit: type=1103 audit(1746838194.098:1346): pid=4202 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.098000 audit[4202]: CRED_ACQ pid=4202 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.568965 kubelet[1942]: I0510 00:49:54.568905 1942 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:49:54.610413 systemd[1]: run-containerd-runc-k8s.io-067df371e51014953c7562ffac5cb0dde475c76a9f6930803cc818b3f833e7bc-runc.6bOk4O.mount: Deactivated successfully. May 10 00:49:54.808919 systemd[1]: run-containerd-runc-k8s.io-067df371e51014953c7562ffac5cb0dde475c76a9f6930803cc818b3f833e7bc-runc.12grbz.mount: Deactivated successfully. May 10 00:49:54.815684 kubelet[1942]: I0510 00:49:54.815576 1942 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-7qrf9" podStartSLOduration=28.191286232 podStartE2EDuration="35.815543473s" podCreationTimestamp="2025-05-10 00:49:19 +0000 UTC" firstStartedPulling="2025-05-10 00:49:45.132632948 +0000 UTC m=+37.948206069" lastFinishedPulling="2025-05-10 00:49:52.756890183 +0000 UTC m=+45.572463310" observedRunningTime="2025-05-10 00:49:53.971327551 +0000 UTC m=+46.786900689" watchObservedRunningTime="2025-05-10 00:49:54.815543473 +0000 UTC m=+47.631116609" May 10 00:49:54.939596 sshd[4200]: pam_unix(sshd:session): session closed for user core May 10 00:49:54.952281 kernel: audit: type=1106 audit(1746838194.941:1347): pid=4200 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.952471 kernel: audit: type=1104 audit(1746838194.941:1348): pid=4200 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.941000 audit[4200]: USER_END pid=4200 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.941000 audit[4200]: CRED_DISP pid=4200 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:49:54.950501 systemd[1]: sshd@8-137.184.1.116:22-139.178.68.195:51518.service: Deactivated successfully. May 10 00:49:54.951842 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:49:54.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-137.184.1.116:22-139.178.68.195:51518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:54.958109 kernel: audit: type=1131 audit(1746838194.950:1349): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-137.184.1.116:22-139.178.68.195:51518 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:54.957482 systemd-logind[1179]: Session 8 logged out. Waiting for processes to exit. May 10 00:49:54.959724 systemd-logind[1179]: Removed session 8. May 10 00:49:56.218881 kubelet[1942]: I0510 00:49:56.218824 1942 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:49:56.312000 audit[4250]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:56.312000 audit[4250]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc329c9050 a2=0 a3=7ffc329c903c items=0 ppid=2062 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:56.312000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:56.317000 audit[4250]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:49:56.317000 audit[4250]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc329c9050 a2=0 a3=7ffc329c903c items=0 ppid=2062 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:49:56.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:49:59.946569 systemd[1]: Started sshd@9-137.184.1.116:22-139.178.68.195:54578.service. May 10 00:49:59.951830 kernel: kauditd_printk_skb: 6 callbacks suppressed May 10 00:49:59.952006 kernel: audit: type=1130 audit(1746838199.946:1352): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.1.116:22-139.178.68.195:54578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:49:59.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.1.116:22-139.178.68.195:54578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:00.006000 audit[4255]: USER_ACCT pid=4255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.007347 sshd[4255]: Accepted publickey for core from 139.178.68.195 port 54578 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:00.010000 audit[4255]: CRED_ACQ pid=4255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.012256 sshd[4255]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:00.015210 kernel: audit: type=1101 audit(1746838200.006:1353): pid=4255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.015412 kernel: audit: type=1103 audit(1746838200.010:1354): pid=4255 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.015470 kernel: audit: type=1006 audit(1746838200.011:1355): pid=4255 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:50:00.011000 audit[4255]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2724cf0 a2=3 a3=0 items=0 ppid=1 pid=4255 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.021725 kernel: audit: type=1300 audit(1746838200.011:1355): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2724cf0 a2=3 a3=0 items=0 ppid=1 pid=4255 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:00.021948 kernel: audit: type=1327 audit(1746838200.011:1355): proctitle=737368643A20636F7265205B707269765D May 10 00:50:00.011000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:00.028226 systemd-logind[1179]: New session 9 of user core. May 10 00:50:00.028385 systemd[1]: Started session-9.scope. May 10 00:50:00.037000 audit[4255]: USER_START pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.040000 audit[4257]: CRED_ACQ pid=4257 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.052414 kernel: audit: type=1105 audit(1746838200.037:1356): pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.052600 kernel: audit: type=1103 audit(1746838200.040:1357): pid=4257 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.352211 sshd[4255]: pam_unix(sshd:session): session closed for user core May 10 00:50:00.361000 audit[4255]: USER_END pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.364942 systemd[1]: sshd@9-137.184.1.116:22-139.178.68.195:54578.service: Deactivated successfully. May 10 00:50:00.366178 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:50:00.367271 kernel: audit: type=1106 audit(1746838200.361:1358): pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.361000 audit[4255]: CRED_DISP pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.367983 systemd-logind[1179]: Session 9 logged out. Waiting for processes to exit. May 10 00:50:00.372751 kernel: audit: type=1104 audit(1746838200.361:1359): pid=4255 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:00.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-137.184.1.116:22-139.178.68.195:54578 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:00.374457 systemd-logind[1179]: Removed session 9. May 10 00:50:02.059000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:02.059000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:02.059000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002f66500 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:50:02.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:02.059000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0029b0750 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:50:02.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:03.037000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:03.037000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0060e98e0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:50:03.037000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:50:03.040000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:03.040000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c005eacdb0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:50:03.040000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:50:03.044000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526364 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:03.044000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00575f710 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:50:03.044000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:50:03.059000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526370 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:03.059000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c005eacfc0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:50:03.059000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:50:03.095000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:03.095000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0060e99a0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:50:03.096000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:03.096000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=72 a1=c00575fcb0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:50:03.096000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:50:03.095000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:50:05.360555 systemd[1]: Started sshd@10-137.184.1.116:22-139.178.68.195:41986.service. May 10 00:50:05.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-137.184.1.116:22-139.178.68.195:41986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:05.364070 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 00:50:05.364210 kernel: audit: type=1130 audit(1746838205.361:1369): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-137.184.1.116:22-139.178.68.195:41986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:05.422000 audit[4275]: USER_ACCT pid=4275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.423448 sshd[4275]: Accepted publickey for core from 139.178.68.195 port 41986 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:05.427000 audit[4275]: CRED_ACQ pid=4275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.428636 sshd[4275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:05.431625 kernel: audit: type=1101 audit(1746838205.422:1370): pid=4275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.432023 kernel: audit: type=1103 audit(1746838205.427:1371): pid=4275 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.427000 audit[4275]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3a0a7190 a2=3 a3=0 items=0 ppid=1 pid=4275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:05.439577 kernel: audit: type=1006 audit(1746838205.427:1372): pid=4275 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:50:05.439865 kernel: audit: type=1300 audit(1746838205.427:1372): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3a0a7190 a2=3 a3=0 items=0 ppid=1 pid=4275 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:05.442668 kernel: audit: type=1327 audit(1746838205.427:1372): proctitle=737368643A20636F7265205B707269765D May 10 00:50:05.427000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:05.443872 systemd[1]: Started session-10.scope. May 10 00:50:05.444348 systemd-logind[1179]: New session 10 of user core. May 10 00:50:05.454000 audit[4275]: USER_START pid=4275 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.460460 kernel: audit: type=1105 audit(1746838205.454:1373): pid=4275 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.461626 kernel: audit: type=1103 audit(1746838205.460:1374): pid=4277 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.460000 audit[4277]: CRED_ACQ pid=4277 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.641554 sshd[4275]: pam_unix(sshd:session): session closed for user core May 10 00:50:05.643000 audit[4275]: USER_END pid=4275 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.649674 kernel: audit: type=1106 audit(1746838205.643:1375): pid=4275 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.649845 kernel: audit: type=1104 audit(1746838205.644:1376): pid=4275 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.644000 audit[4275]: CRED_DISP pid=4275 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:05.647671 systemd[1]: sshd@10-137.184.1.116:22-139.178.68.195:41986.service: Deactivated successfully. May 10 00:50:05.649036 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:50:05.652630 systemd-logind[1179]: Session 10 logged out. Waiting for processes to exit. May 10 00:50:05.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-137.184.1.116:22-139.178.68.195:41986 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:05.655427 systemd-logind[1179]: Removed session 10. May 10 00:50:07.398000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:07.398000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002f67c00 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:50:07.398000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:07.398000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:07.398000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002e90d20 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:50:07.398000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:07.400000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:07.400000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002f67c20 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:50:07.400000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:07.401000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:50:07.401000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002e90d40 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:50:07.401000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:50:07.479268 env[1186]: time="2025-05-10T00:50:07.479166590Z" level=info msg="StopPodSandbox for \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\"" May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.679 [WARNING][4300] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0", GenerateName:"calico-kube-controllers-c784ff45b-", Namespace:"calico-system", SelfLink:"", UID:"386f41f8-cbb4-41b5-b490-165b6012419b", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c784ff45b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a", Pod:"calico-kube-controllers-c784ff45b-6hpcv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid577cf5fae4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.682 [INFO][4300] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.682 [INFO][4300] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" iface="eth0" netns="" May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.682 [INFO][4300] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.682 [INFO][4300] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.728 [INFO][4309] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.728 [INFO][4309] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.728 [INFO][4309] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.745 [WARNING][4309] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.745 [INFO][4309] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.751 [INFO][4309] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:07.760714 env[1186]: 2025-05-10 00:50:07.756 [INFO][4300] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:50:07.762529 env[1186]: time="2025-05-10T00:50:07.760755314Z" level=info msg="TearDown network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\" successfully" May 10 00:50:07.762529 env[1186]: time="2025-05-10T00:50:07.760804332Z" level=info msg="StopPodSandbox for \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\" returns successfully" May 10 00:50:07.762529 env[1186]: time="2025-05-10T00:50:07.761868160Z" level=info msg="RemovePodSandbox for \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\"" May 10 00:50:07.762529 env[1186]: time="2025-05-10T00:50:07.761950927Z" level=info msg="Forcibly stopping sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\"" May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.876 [WARNING][4327] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0", GenerateName:"calico-kube-controllers-c784ff45b-", Namespace:"calico-system", SelfLink:"", UID:"386f41f8-cbb4-41b5-b490-165b6012419b", ResourceVersion:"919", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c784ff45b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"acd778d659e93fba7094714279d3a4049ced145b72598705fdc055ad56a1f19a", Pod:"calico-kube-controllers-c784ff45b-6hpcv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.35.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid577cf5fae4", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.877 [INFO][4327] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.877 [INFO][4327] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" iface="eth0" netns="" May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.877 [INFO][4327] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.877 [INFO][4327] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.917 [INFO][4335] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.917 [INFO][4335] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.917 [INFO][4335] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.928 [WARNING][4335] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.928 [INFO][4335] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" HandleID="k8s-pod-network.9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" Workload="ci--3510.3.7--n--7542157996-k8s-calico--kube--controllers--c784ff45b--6hpcv-eth0" May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.932 [INFO][4335] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:07.941142 env[1186]: 2025-05-10 00:50:07.936 [INFO][4327] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508" May 10 00:50:07.942782 env[1186]: time="2025-05-10T00:50:07.941615068Z" level=info msg="TearDown network for sandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\" successfully" May 10 00:50:07.948770 env[1186]: time="2025-05-10T00:50:07.948704282Z" level=info msg="RemovePodSandbox \"9bbd7d5037d2542e9f620ebb46bb6baf81a42322aa79754c98064f5d8f78c508\" returns successfully" May 10 00:50:07.950426 env[1186]: time="2025-05-10T00:50:07.950357850Z" level=info msg="StopPodSandbox for \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\"" May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.079 [WARNING][4354] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0", GenerateName:"calico-apiserver-65b9b9f465-", Namespace:"calico-apiserver", SelfLink:"", UID:"1da4b4d0-3ee1-4926-bb82-46a685e086be", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65b9b9f465", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f", Pod:"calico-apiserver-65b9b9f465-xp854", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali200a0a9ca39", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.079 [INFO][4354] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.080 [INFO][4354] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" iface="eth0" netns="" May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.080 [INFO][4354] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.080 [INFO][4354] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.132 [INFO][4361] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.132 [INFO][4361] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.132 [INFO][4361] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.142 [WARNING][4361] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.142 [INFO][4361] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.145 [INFO][4361] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:08.152459 env[1186]: 2025-05-10 00:50:08.148 [INFO][4354] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:50:08.152459 env[1186]: time="2025-05-10T00:50:08.152350467Z" level=info msg="TearDown network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\" successfully" May 10 00:50:08.152459 env[1186]: time="2025-05-10T00:50:08.152392079Z" level=info msg="StopPodSandbox for \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\" returns successfully" May 10 00:50:08.155686 env[1186]: time="2025-05-10T00:50:08.155637432Z" level=info msg="RemovePodSandbox for \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\"" May 10 00:50:08.156098 env[1186]: time="2025-05-10T00:50:08.156009269Z" level=info msg="Forcibly stopping sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\"" May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.245 [WARNING][4380] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0", GenerateName:"calico-apiserver-65b9b9f465-", Namespace:"calico-apiserver", SelfLink:"", UID:"1da4b4d0-3ee1-4926-bb82-46a685e086be", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65b9b9f465", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"166a06f3edc0e4017c689a21826002139ababc693519e9619c188902ed044b4f", Pod:"calico-apiserver-65b9b9f465-xp854", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali200a0a9ca39", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.246 [INFO][4380] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.246 [INFO][4380] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" iface="eth0" netns="" May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.246 [INFO][4380] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.246 [INFO][4380] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.290 [INFO][4387] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.291 [INFO][4387] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.291 [INFO][4387] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.303 [WARNING][4387] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.303 [INFO][4387] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" HandleID="k8s-pod-network.831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--xp854-eth0" May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.309 [INFO][4387] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:08.316552 env[1186]: 2025-05-10 00:50:08.312 [INFO][4380] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d" May 10 00:50:08.316552 env[1186]: time="2025-05-10T00:50:08.316551040Z" level=info msg="TearDown network for sandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\" successfully" May 10 00:50:08.322772 env[1186]: time="2025-05-10T00:50:08.322069795Z" level=info msg="RemovePodSandbox \"831bdb194dc5cc12dc1e8e0ad129da47b91aea0bf6666636836e3efe338c1f4d\" returns successfully" May 10 00:50:08.323035 env[1186]: time="2025-05-10T00:50:08.322993505Z" level=info msg="StopPodSandbox for \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\"" May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.394 [WARNING][4408] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"658c528b-9320-4600-9e74-e5919a8d11ff", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8", Pod:"coredns-6f6b679f8f-cvd85", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib689ec99fdd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.395 [INFO][4408] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.395 [INFO][4408] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" iface="eth0" netns="" May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.395 [INFO][4408] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.395 [INFO][4408] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.451 [INFO][4415] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.451 [INFO][4415] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.451 [INFO][4415] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.463 [WARNING][4415] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.463 [INFO][4415] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.467 [INFO][4415] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:08.475138 env[1186]: 2025-05-10 00:50:08.471 [INFO][4408] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:50:08.475138 env[1186]: time="2025-05-10T00:50:08.475117547Z" level=info msg="TearDown network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\" successfully" May 10 00:50:08.476869 env[1186]: time="2025-05-10T00:50:08.475167865Z" level=info msg="StopPodSandbox for \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\" returns successfully" May 10 00:50:08.476869 env[1186]: time="2025-05-10T00:50:08.476215625Z" level=info msg="RemovePodSandbox for \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\"" May 10 00:50:08.477104 env[1186]: time="2025-05-10T00:50:08.476340587Z" level=info msg="Forcibly stopping sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\"" May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.552 [WARNING][4434] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"658c528b-9320-4600-9e74-e5919a8d11ff", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"2fb346a9d5d16f6c3dd1bbdd1ca76a06b3e4cad86ce31cc4c66174d711a0dbe8", Pod:"coredns-6f6b679f8f-cvd85", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib689ec99fdd", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.552 [INFO][4434] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.553 [INFO][4434] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" iface="eth0" netns="" May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.553 [INFO][4434] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.559 [INFO][4434] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.614 [INFO][4442] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.615 [INFO][4442] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.615 [INFO][4442] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.625 [WARNING][4442] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.625 [INFO][4442] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" HandleID="k8s-pod-network.31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--cvd85-eth0" May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.628 [INFO][4442] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:08.635076 env[1186]: 2025-05-10 00:50:08.631 [INFO][4434] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25" May 10 00:50:08.636698 env[1186]: time="2025-05-10T00:50:08.636633943Z" level=info msg="TearDown network for sandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\" successfully" May 10 00:50:08.644661 env[1186]: time="2025-05-10T00:50:08.644576439Z" level=info msg="RemovePodSandbox \"31b5f67ff945637ea97a56da853c02779d95cd612d7abb18156db4294b75bf25\" returns successfully" May 10 00:50:08.646010 env[1186]: time="2025-05-10T00:50:08.645951367Z" level=info msg="StopPodSandbox for \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\"" May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.712 [WARNING][4461] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0", GenerateName:"calico-apiserver-65b9b9f465-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d27ebc2-318a-4cd0-8b96-ed411e05461e", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65b9b9f465", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f", Pod:"calico-apiserver-65b9b9f465-tvlz9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali830b082c575", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.713 [INFO][4461] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.713 [INFO][4461] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" iface="eth0" netns="" May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.713 [INFO][4461] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.713 [INFO][4461] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.753 [INFO][4468] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.754 [INFO][4468] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.754 [INFO][4468] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.770 [WARNING][4468] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.770 [INFO][4468] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.776 [INFO][4468] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:08.782729 env[1186]: 2025-05-10 00:50:08.779 [INFO][4461] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:50:08.782729 env[1186]: time="2025-05-10T00:50:08.782669701Z" level=info msg="TearDown network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\" successfully" May 10 00:50:08.784524 env[1186]: time="2025-05-10T00:50:08.783636785Z" level=info msg="StopPodSandbox for \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\" returns successfully" May 10 00:50:08.785046 env[1186]: time="2025-05-10T00:50:08.784986773Z" level=info msg="RemovePodSandbox for \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\"" May 10 00:50:08.785414 env[1186]: time="2025-05-10T00:50:08.785349708Z" level=info msg="Forcibly stopping sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\"" May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.854 [WARNING][4487] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0", GenerateName:"calico-apiserver-65b9b9f465-", Namespace:"calico-apiserver", SelfLink:"", UID:"5d27ebc2-318a-4cd0-8b96-ed411e05461e", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 18, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"65b9b9f465", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"41e5549c77a3c7c52314554feac716822ef7c78fe65de28feec79a22191a169f", Pod:"calico-apiserver-65b9b9f465-tvlz9", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.35.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali830b082c575", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.855 [INFO][4487] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.855 [INFO][4487] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" iface="eth0" netns="" May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.855 [INFO][4487] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.855 [INFO][4487] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.905 [INFO][4494] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.905 [INFO][4494] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.905 [INFO][4494] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.916 [WARNING][4494] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.917 [INFO][4494] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" HandleID="k8s-pod-network.158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" Workload="ci--3510.3.7--n--7542157996-k8s-calico--apiserver--65b9b9f465--tvlz9-eth0" May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.922 [INFO][4494] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:08.929466 env[1186]: 2025-05-10 00:50:08.926 [INFO][4487] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b" May 10 00:50:08.931111 env[1186]: time="2025-05-10T00:50:08.930431263Z" level=info msg="TearDown network for sandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\" successfully" May 10 00:50:08.934780 env[1186]: time="2025-05-10T00:50:08.934669112Z" level=info msg="RemovePodSandbox \"158b522627a30a6f2a48cfb51dee59df195280a9b5354386f7061f862eb4253b\" returns successfully" May 10 00:50:08.935642 env[1186]: time="2025-05-10T00:50:08.935594915Z" level=info msg="StopPodSandbox for \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\"" May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.019 [WARNING][4512] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"76ed2555-08dd-48f1-8481-5c17a11b0064", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9", Pod:"csi-node-driver-7qrf9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali12e4b66880a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.019 [INFO][4512] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.019 [INFO][4512] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" iface="eth0" netns="" May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.019 [INFO][4512] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.019 [INFO][4512] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.059 [INFO][4520] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.059 [INFO][4520] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.059 [INFO][4520] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.069 [WARNING][4520] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.069 [INFO][4520] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.073 [INFO][4520] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:09.078390 env[1186]: 2025-05-10 00:50:09.075 [INFO][4512] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:50:09.079626 env[1186]: time="2025-05-10T00:50:09.079387363Z" level=info msg="TearDown network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\" successfully" May 10 00:50:09.079626 env[1186]: time="2025-05-10T00:50:09.079462289Z" level=info msg="StopPodSandbox for \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\" returns successfully" May 10 00:50:09.080312 env[1186]: time="2025-05-10T00:50:09.080209048Z" level=info msg="RemovePodSandbox for \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\"" May 10 00:50:09.080312 env[1186]: time="2025-05-10T00:50:09.080263248Z" level=info msg="Forcibly stopping sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\"" May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.149 [WARNING][4538] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"76ed2555-08dd-48f1-8481-5c17a11b0064", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"7d5b6b05e69de32272de2e7d07a5cff7bbff73b9b8e8be3cebb9d515af1947a9", Pod:"csi-node-driver-7qrf9", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.35.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali12e4b66880a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.150 [INFO][4538] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.150 [INFO][4538] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" iface="eth0" netns="" May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.150 [INFO][4538] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.150 [INFO][4538] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.193 [INFO][4545] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.193 [INFO][4545] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.193 [INFO][4545] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.203 [WARNING][4545] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.203 [INFO][4545] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" HandleID="k8s-pod-network.d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" Workload="ci--3510.3.7--n--7542157996-k8s-csi--node--driver--7qrf9-eth0" May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.207 [INFO][4545] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:09.213718 env[1186]: 2025-05-10 00:50:09.210 [INFO][4538] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94" May 10 00:50:09.213718 env[1186]: time="2025-05-10T00:50:09.213629769Z" level=info msg="TearDown network for sandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\" successfully" May 10 00:50:09.218604 env[1186]: time="2025-05-10T00:50:09.218520781Z" level=info msg="RemovePodSandbox \"d19843a5ce5030f40664211be1a8468842c3ac86f4ab6d6bdd61c2b766a51a94\" returns successfully" May 10 00:50:09.219480 env[1186]: time="2025-05-10T00:50:09.219415758Z" level=info msg="StopPodSandbox for \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\"" May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.292 [WARNING][4565] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6712168e-7716-472d-9f5c-721fe9599338", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d", Pod:"coredns-6f6b679f8f-wsjx2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali592954a3d3d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.293 [INFO][4565] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.293 [INFO][4565] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" iface="eth0" netns="" May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.293 [INFO][4565] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.293 [INFO][4565] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.350 [INFO][4572] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.350 [INFO][4572] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.350 [INFO][4572] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.363 [WARNING][4572] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.363 [INFO][4572] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.366 [INFO][4572] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:09.372547 env[1186]: 2025-05-10 00:50:09.369 [INFO][4565] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:50:09.374683 env[1186]: time="2025-05-10T00:50:09.374425092Z" level=info msg="TearDown network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\" successfully" May 10 00:50:09.374683 env[1186]: time="2025-05-10T00:50:09.374540686Z" level=info msg="StopPodSandbox for \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\" returns successfully" May 10 00:50:09.375384 env[1186]: time="2025-05-10T00:50:09.375339055Z" level=info msg="RemovePodSandbox for \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\"" May 10 00:50:09.375493 env[1186]: time="2025-05-10T00:50:09.375394407Z" level=info msg="Forcibly stopping sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\"" May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.434 [WARNING][4591] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"6712168e-7716-472d-9f5c-721fe9599338", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 49, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.7-n-7542157996", ContainerID:"c15d2f158a50b71007be67103b663bff8a324e6b6cc3a75bdb5e346480b9cd4d", Pod:"coredns-6f6b679f8f-wsjx2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.35.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali592954a3d3d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.434 [INFO][4591] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.434 [INFO][4591] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" iface="eth0" netns="" May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.434 [INFO][4591] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.434 [INFO][4591] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.484 [INFO][4598] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.485 [INFO][4598] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.485 [INFO][4598] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.495 [WARNING][4598] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.495 [INFO][4598] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" HandleID="k8s-pod-network.e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" Workload="ci--3510.3.7--n--7542157996-k8s-coredns--6f6b679f8f--wsjx2-eth0" May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.498 [INFO][4598] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:50:09.504752 env[1186]: 2025-05-10 00:50:09.501 [INFO][4591] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f" May 10 00:50:09.506073 env[1186]: time="2025-05-10T00:50:09.504790049Z" level=info msg="TearDown network for sandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\" successfully" May 10 00:50:09.508404 env[1186]: time="2025-05-10T00:50:09.508217645Z" level=info msg="RemovePodSandbox \"e0042a3a73a488076c655f1e72e53c0c790c330d269e3515e958c6a6dd6a878f\" returns successfully" May 10 00:50:10.647578 systemd[1]: Started sshd@11-137.184.1.116:22-139.178.68.195:41996.service. May 10 00:50:10.648000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-137.184.1.116:22-139.178.68.195:41996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:10.650221 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 00:50:10.650360 kernel: audit: type=1130 audit(1746838210.648:1382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-137.184.1.116:22-139.178.68.195:41996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:10.736000 audit[4605]: USER_ACCT pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.736634 sshd[4605]: Accepted publickey for core from 139.178.68.195 port 41996 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:10.740334 kernel: audit: type=1101 audit(1746838210.736:1383): pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.741000 audit[4605]: CRED_ACQ pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.746942 kernel: audit: type=1103 audit(1746838210.741:1384): pid=4605 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.747139 kernel: audit: type=1006 audit(1746838210.741:1385): pid=4605 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 10 00:50:10.747180 kernel: audit: type=1300 audit(1746838210.741:1385): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5610b080 a2=3 a3=0 items=0 ppid=1 pid=4605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:10.741000 audit[4605]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5610b080 a2=3 a3=0 items=0 ppid=1 pid=4605 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:10.741000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:10.751413 sshd[4605]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:10.751834 kernel: audit: type=1327 audit(1746838210.741:1385): proctitle=737368643A20636F7265205B707269765D May 10 00:50:10.760961 systemd[1]: Started session-11.scope. May 10 00:50:10.761550 systemd-logind[1179]: New session 11 of user core. May 10 00:50:10.766000 audit[4605]: USER_START pid=4605 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.770000 audit[4607]: CRED_ACQ pid=4607 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.774126 kernel: audit: type=1105 audit(1746838210.766:1386): pid=4605 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.774407 kernel: audit: type=1103 audit(1746838210.770:1387): pid=4607 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.954502 sshd[4605]: pam_unix(sshd:session): session closed for user core May 10 00:50:10.959000 audit[4605]: USER_END pid=4605 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.965565 kernel: audit: type=1106 audit(1746838210.959:1388): pid=4605 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.965722 kernel: audit: type=1104 audit(1746838210.959:1389): pid=4605 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.959000 audit[4605]: CRED_DISP pid=4605 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:10.968834 systemd[1]: Started sshd@12-137.184.1.116:22-139.178.68.195:42006.service. May 10 00:50:10.969787 systemd[1]: sshd@11-137.184.1.116:22-139.178.68.195:41996.service: Deactivated successfully. May 10 00:50:10.972788 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:50:10.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-137.184.1.116:22-139.178.68.195:42006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:10.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-137.184.1.116:22-139.178.68.195:41996 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:10.975002 systemd-logind[1179]: Session 11 logged out. Waiting for processes to exit. May 10 00:50:10.976099 systemd-logind[1179]: Removed session 11. May 10 00:50:11.015000 audit[4616]: USER_ACCT pid=4616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.016004 sshd[4616]: Accepted publickey for core from 139.178.68.195 port 42006 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:11.017000 audit[4616]: CRED_ACQ pid=4616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.017000 audit[4616]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc00d7140 a2=3 a3=0 items=0 ppid=1 pid=4616 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:11.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:11.018654 sshd[4616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:11.026078 systemd[1]: Started session-12.scope. May 10 00:50:11.027124 systemd-logind[1179]: New session 12 of user core. May 10 00:50:11.033000 audit[4616]: USER_START pid=4616 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.035000 audit[4619]: CRED_ACQ pid=4619 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.257923 sshd[4616]: pam_unix(sshd:session): session closed for user core May 10 00:50:11.263000 audit[4616]: USER_END pid=4616 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.264000 audit[4616]: CRED_DISP pid=4616 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.271593 systemd[1]: Started sshd@13-137.184.1.116:22-139.178.68.195:42008.service. May 10 00:50:11.272761 systemd[1]: sshd@12-137.184.1.116:22-139.178.68.195:42006.service: Deactivated successfully. May 10 00:50:11.273928 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:50:11.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-137.184.1.116:22-139.178.68.195:42008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-137.184.1.116:22-139.178.68.195:42006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.276353 systemd-logind[1179]: Session 12 logged out. Waiting for processes to exit. May 10 00:50:11.280572 systemd-logind[1179]: Removed session 12. May 10 00:50:11.311000 audit[4626]: USER_ACCT pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.311694 sshd[4626]: Accepted publickey for core from 139.178.68.195 port 42008 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:11.313000 audit[4626]: CRED_ACQ pid=4626 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.313000 audit[4626]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfb362730 a2=3 a3=0 items=0 ppid=1 pid=4626 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:11.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:11.314698 sshd[4626]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:11.321798 systemd-logind[1179]: New session 13 of user core. May 10 00:50:11.322480 systemd[1]: Started session-13.scope. May 10 00:50:11.331000 audit[4626]: USER_START pid=4626 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.333000 audit[4629]: CRED_ACQ pid=4629 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.485486 sshd[4626]: pam_unix(sshd:session): session closed for user core May 10 00:50:11.487000 audit[4626]: USER_END pid=4626 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.488000 audit[4626]: CRED_DISP pid=4626 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:11.490783 systemd[1]: sshd@13-137.184.1.116:22-139.178.68.195:42008.service: Deactivated successfully. May 10 00:50:11.491692 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:50:11.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-137.184.1.116:22-139.178.68.195:42008 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:11.492857 systemd-logind[1179]: Session 13 logged out. Waiting for processes to exit. May 10 00:50:11.493883 systemd-logind[1179]: Removed session 13. May 10 00:50:16.501224 systemd[1]: Started sshd@14-137.184.1.116:22-139.178.68.195:47334.service. May 10 00:50:16.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.1.116:22-139.178.68.195:47334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:16.505278 kernel: kauditd_printk_skb: 23 callbacks suppressed May 10 00:50:16.505477 kernel: audit: type=1130 audit(1746838216.502:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.1.116:22-139.178.68.195:47334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:16.585000 audit[4646]: USER_ACCT pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.586588 sshd[4646]: Accepted publickey for core from 139.178.68.195 port 47334 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:16.591617 kernel: audit: type=1101 audit(1746838216.585:1410): pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.591000 audit[4646]: CRED_ACQ pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.599414 kernel: audit: type=1103 audit(1746838216.591:1411): pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.599582 kernel: audit: type=1006 audit(1746838216.591:1412): pid=4646 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 10 00:50:16.591000 audit[4646]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde3061e00 a2=3 a3=0 items=0 ppid=1 pid=4646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.603297 sshd[4646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:16.607946 kernel: audit: type=1300 audit(1746838216.591:1412): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde3061e00 a2=3 a3=0 items=0 ppid=1 pid=4646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:16.608115 kernel: audit: type=1327 audit(1746838216.591:1412): proctitle=737368643A20636F7265205B707269765D May 10 00:50:16.591000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:16.617440 systemd-logind[1179]: New session 14 of user core. May 10 00:50:16.619284 systemd[1]: Started session-14.scope. May 10 00:50:16.629000 audit[4646]: USER_START pid=4646 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.634000 audit[4649]: CRED_ACQ pid=4649 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.638457 kernel: audit: type=1105 audit(1746838216.629:1413): pid=4646 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.638647 kernel: audit: type=1103 audit(1746838216.634:1414): pid=4649 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.830589 sshd[4646]: pam_unix(sshd:session): session closed for user core May 10 00:50:16.832000 audit[4646]: USER_END pid=4646 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.838177 kernel: audit: type=1106 audit(1746838216.832:1415): pid=4646 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.832000 audit[4646]: CRED_DISP pid=4646 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.841305 kernel: audit: type=1104 audit(1746838216.832:1416): pid=4646 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:16.840201 systemd[1]: sshd@14-137.184.1.116:22-139.178.68.195:47334.service: Deactivated successfully. May 10 00:50:16.841222 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:50:16.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-137.184.1.116:22-139.178.68.195:47334 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:16.842777 systemd-logind[1179]: Session 14 logged out. Waiting for processes to exit. May 10 00:50:16.844041 systemd-logind[1179]: Removed session 14. May 10 00:50:21.820948 kubelet[1942]: I0510 00:50:21.820884 1942 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:50:21.840941 systemd[1]: Started sshd@15-137.184.1.116:22-139.178.68.195:47340.service. May 10 00:50:21.845717 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:50:21.845907 kernel: audit: type=1130 audit(1746838221.840:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.1.116:22-139.178.68.195:47340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:21.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.1.116:22-139.178.68.195:47340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:21.910000 audit[4668]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:21.914259 kernel: audit: type=1325 audit(1746838221.910:1419): table=filter:119 family=2 entries=8 op=nft_register_rule pid=4668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:21.910000 audit[4668]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd9c282dc0 a2=0 a3=7ffd9c282dac items=0 ppid=2062 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.919541 kernel: audit: type=1300 audit(1746838221.910:1419): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd9c282dc0 a2=0 a3=7ffd9c282dac items=0 ppid=2062 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.910000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:21.922310 kernel: audit: type=1327 audit(1746838221.910:1419): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:21.922000 audit[4668]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:21.922000 audit[4668]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd9c282dc0 a2=0 a3=7ffd9c282dac items=0 ppid=2062 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.930679 kernel: audit: type=1325 audit(1746838221.922:1420): table=nat:120 family=2 entries=34 op=nft_register_chain pid=4668 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:21.930872 kernel: audit: type=1300 audit(1746838221.922:1420): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffd9c282dc0 a2=0 a3=7ffd9c282dac items=0 ppid=2062 pid=4668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.930944 kernel: audit: type=1327 audit(1746838221.922:1420): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:21.922000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:21.938000 audit[4665]: USER_ACCT pid=4665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:21.940189 sshd[4665]: Accepted publickey for core from 139.178.68.195 port 47340 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:21.942000 audit[4665]: CRED_ACQ pid=4665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:21.944463 kernel: audit: type=1101 audit(1746838221.938:1421): pid=4665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:21.944520 kernel: audit: type=1103 audit(1746838221.942:1422): pid=4665 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:21.948323 sshd[4665]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:21.949466 kernel: audit: type=1006 audit(1746838221.943:1423): pid=4665 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 00:50:21.943000 audit[4665]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed1cffaf0 a2=3 a3=0 items=0 ppid=1 pid=4665 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:21.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:21.956328 systemd-logind[1179]: New session 15 of user core. May 10 00:50:21.957908 systemd[1]: Started session-15.scope. May 10 00:50:21.963000 audit[4665]: USER_START pid=4665 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:21.966000 audit[4669]: CRED_ACQ pid=4669 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:22.199002 sshd[4665]: pam_unix(sshd:session): session closed for user core May 10 00:50:22.202000 audit[4665]: USER_END pid=4665 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:22.202000 audit[4665]: CRED_DISP pid=4665 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:22.205000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-137.184.1.116:22-139.178.68.195:47340 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:22.206788 systemd[1]: sshd@15-137.184.1.116:22-139.178.68.195:47340.service: Deactivated successfully. May 10 00:50:22.207950 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:50:22.209000 systemd-logind[1179]: Session 15 logged out. Waiting for processes to exit. May 10 00:50:22.210514 systemd-logind[1179]: Removed session 15. May 10 00:50:23.200744 systemd[1]: run-containerd-runc-k8s.io-91922a4d0c80e5d383493a8bb857e57aec5a2d8cd76827a68ff5740919b2b2c9-runc.P0XYHK.mount: Deactivated successfully. May 10 00:50:24.509425 kubelet[1942]: E0510 00:50:24.509349 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:27.209916 systemd[1]: Started sshd@16-137.184.1.116:22-139.178.68.195:43746.service. May 10 00:50:27.216205 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:50:27.216464 kernel: audit: type=1130 audit(1746838227.211:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.1.116:22-139.178.68.195:43746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:27.211000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.1.116:22-139.178.68.195:43746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:27.310882 sshd[4719]: Accepted publickey for core from 139.178.68.195 port 43746 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:27.317350 kernel: audit: type=1101 audit(1746838227.309:1430): pid=4719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.309000 audit[4719]: USER_ACCT pid=4719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.315000 audit[4719]: CRED_ACQ pid=4719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.327351 kernel: audit: type=1103 audit(1746838227.315:1431): pid=4719 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.327519 kernel: audit: type=1006 audit(1746838227.315:1432): pid=4719 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:50:27.315000 audit[4719]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc142a6960 a2=3 a3=0 items=0 ppid=1 pid=4719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:27.333084 kernel: audit: type=1300 audit(1746838227.315:1432): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc142a6960 a2=3 a3=0 items=0 ppid=1 pid=4719 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:27.333398 kernel: audit: type=1327 audit(1746838227.315:1432): proctitle=737368643A20636F7265205B707269765D May 10 00:50:27.315000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:27.335446 sshd[4719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:27.348674 systemd[1]: Started session-16.scope. May 10 00:50:27.349488 systemd-logind[1179]: New session 16 of user core. May 10 00:50:27.355000 audit[4719]: USER_START pid=4719 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.363006 kernel: audit: type=1105 audit(1746838227.355:1433): pid=4719 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.362000 audit[4721]: CRED_ACQ pid=4721 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.367288 kernel: audit: type=1103 audit(1746838227.362:1434): pid=4721 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.704490 sshd[4719]: pam_unix(sshd:session): session closed for user core May 10 00:50:27.704000 audit[4719]: USER_END pid=4719 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.705000 audit[4719]: CRED_DISP pid=4719 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.712966 kernel: audit: type=1106 audit(1746838227.704:1435): pid=4719 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.713122 kernel: audit: type=1104 audit(1746838227.705:1436): pid=4719 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:27.716812 systemd[1]: sshd@16-137.184.1.116:22-139.178.68.195:43746.service: Deactivated successfully. May 10 00:50:27.718709 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:50:27.719513 systemd-logind[1179]: Session 16 logged out. Waiting for processes to exit. May 10 00:50:27.721023 systemd-logind[1179]: Removed session 16. May 10 00:50:27.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-137.184.1.116:22-139.178.68.195:43746 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:32.509011 kubelet[1942]: E0510 00:50:32.508935 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:32.714827 systemd[1]: Started sshd@17-137.184.1.116:22-139.178.68.195:43760.service. May 10 00:50:32.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.1.116:22-139.178.68.195:43760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:32.715887 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:50:32.716005 kernel: audit: type=1130 audit(1746838232.713:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.1.116:22-139.178.68.195:43760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:32.767000 audit[4732]: USER_ACCT pid=4732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.772659 sshd[4732]: Accepted publickey for core from 139.178.68.195 port 43760 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:32.773284 kernel: audit: type=1101 audit(1746838232.767:1439): pid=4732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.773000 audit[4732]: CRED_ACQ pid=4732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.776743 sshd[4732]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:32.780589 kernel: audit: type=1103 audit(1746838232.773:1440): pid=4732 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.780752 kernel: audit: type=1006 audit(1746838232.774:1441): pid=4732 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 00:50:32.774000 audit[4732]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd00cbf1e0 a2=3 a3=0 items=0 ppid=1 pid=4732 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:32.784517 kernel: audit: type=1300 audit(1746838232.774:1441): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd00cbf1e0 a2=3 a3=0 items=0 ppid=1 pid=4732 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:32.774000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:32.787266 kernel: audit: type=1327 audit(1746838232.774:1441): proctitle=737368643A20636F7265205B707269765D May 10 00:50:32.790722 systemd[1]: Started session-17.scope. May 10 00:50:32.792635 systemd-logind[1179]: New session 17 of user core. May 10 00:50:32.798000 audit[4732]: USER_START pid=4732 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.809867 kernel: audit: type=1105 audit(1746838232.798:1442): pid=4732 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.804000 audit[4734]: CRED_ACQ pid=4734 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.814371 kernel: audit: type=1103 audit(1746838232.804:1443): pid=4734 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.989505 sshd[4732]: pam_unix(sshd:session): session closed for user core May 10 00:50:32.990000 audit[4732]: USER_END pid=4732 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.998466 kernel: audit: type=1106 audit(1746838232.990:1444): pid=4732 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.998645 kernel: audit: type=1104 audit(1746838232.990:1445): pid=4732 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.990000 audit[4732]: CRED_DISP pid=4732 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:32.997233 systemd[1]: sshd@17-137.184.1.116:22-139.178.68.195:43760.service: Deactivated successfully. May 10 00:50:32.999126 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:50:32.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-137.184.1.116:22-139.178.68.195:43760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:33.006425 systemd-logind[1179]: Session 17 logged out. Waiting for processes to exit. May 10 00:50:33.009218 systemd[1]: Started sshd@18-137.184.1.116:22-139.178.68.195:43776.service. May 10 00:50:33.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-137.184.1.116:22-139.178.68.195:43776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:33.012662 systemd-logind[1179]: Removed session 17. May 10 00:50:33.063000 audit[4743]: USER_ACCT pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.065490 sshd[4743]: Accepted publickey for core from 139.178.68.195 port 43776 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:33.066000 audit[4743]: CRED_ACQ pid=4743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.066000 audit[4743]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd09b7c440 a2=3 a3=0 items=0 ppid=1 pid=4743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:33.066000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:33.067971 sshd[4743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:33.075331 systemd[1]: Started session-18.scope. May 10 00:50:33.075756 systemd-logind[1179]: New session 18 of user core. May 10 00:50:33.081000 audit[4743]: USER_START pid=4743 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.083000 audit[4745]: CRED_ACQ pid=4745 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.510496 kubelet[1942]: E0510 00:50:33.510458 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:33.522682 sshd[4743]: pam_unix(sshd:session): session closed for user core May 10 00:50:33.524000 audit[4743]: USER_END pid=4743 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.525000 audit[4743]: CRED_DISP pid=4743 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.528398 systemd[1]: Started sshd@19-137.184.1.116:22-139.178.68.195:43780.service. May 10 00:50:33.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-137.184.1.116:22-139.178.68.195:43780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:33.533000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-137.184.1.116:22-139.178.68.195:43776 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:33.534110 systemd[1]: sshd@18-137.184.1.116:22-139.178.68.195:43776.service: Deactivated successfully. May 10 00:50:33.538021 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:50:33.541600 systemd-logind[1179]: Session 18 logged out. Waiting for processes to exit. May 10 00:50:33.543473 systemd-logind[1179]: Removed session 18. May 10 00:50:33.599000 audit[4752]: USER_ACCT pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.601441 sshd[4752]: Accepted publickey for core from 139.178.68.195 port 43780 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:33.602000 audit[4752]: CRED_ACQ pid=4752 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.602000 audit[4752]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc9224d30 a2=3 a3=0 items=0 ppid=1 pid=4752 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:33.602000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:33.605208 sshd[4752]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:33.614408 systemd[1]: Started session-19.scope. May 10 00:50:33.615468 systemd-logind[1179]: New session 19 of user core. May 10 00:50:33.625000 audit[4752]: USER_START pid=4752 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:33.627000 audit[4755]: CRED_ACQ pid=4755 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:35.975000 audit[4765]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=4765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:35.975000 audit[4765]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff569cc6b0 a2=0 a3=7fff569cc69c items=0 ppid=2062 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:35.975000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:35.980000 audit[4765]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=4765 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:35.980000 audit[4765]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff569cc6b0 a2=0 a3=7fff569cc69c items=0 ppid=2062 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:35.980000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:36.000424 sshd[4752]: pam_unix(sshd:session): session closed for user core May 10 00:50:36.008000 audit[4752]: USER_END pid=4752 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.008000 audit[4752]: CRED_DISP pid=4752 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-137.184.1.116:22-139.178.68.195:55118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.018000 systemd[1]: Started sshd@20-137.184.1.116:22-139.178.68.195:55118.service. May 10 00:50:36.021000 audit[4768]: NETFILTER_CFG table=filter:123 family=2 entries=20 op=nft_register_rule pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:36.021000 audit[4768]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffef1b0a670 a2=0 a3=7ffef1b0a65c items=0 ppid=2062 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:36.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:36.024515 systemd[1]: sshd@19-137.184.1.116:22-139.178.68.195:43780.service: Deactivated successfully. May 10 00:50:36.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-137.184.1.116:22-139.178.68.195:43780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.026743 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:50:36.029442 systemd-logind[1179]: Session 19 logged out. Waiting for processes to exit. May 10 00:50:36.031746 systemd-logind[1179]: Removed session 19. May 10 00:50:36.032000 audit[4768]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=4768 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:36.032000 audit[4768]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffef1b0a670 a2=0 a3=0 items=0 ppid=2062 pid=4768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:36.032000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:36.090000 audit[4769]: USER_ACCT pid=4769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.092260 sshd[4769]: Accepted publickey for core from 139.178.68.195 port 55118 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:36.093000 audit[4769]: CRED_ACQ pid=4769 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.093000 audit[4769]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff856d7160 a2=3 a3=0 items=0 ppid=1 pid=4769 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:36.093000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:36.096596 sshd[4769]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:36.103848 systemd[1]: Started session-20.scope. May 10 00:50:36.104829 systemd-logind[1179]: New session 20 of user core. May 10 00:50:36.109000 audit[4769]: USER_START pid=4769 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.113000 audit[4772]: CRED_ACQ pid=4772 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.686369 sshd[4769]: pam_unix(sshd:session): session closed for user core May 10 00:50:36.686000 audit[4769]: USER_END pid=4769 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.686000 audit[4769]: CRED_DISP pid=4769 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.693704 systemd[1]: Started sshd@21-137.184.1.116:22-139.178.68.195:55126.service. May 10 00:50:36.696000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-137.184.1.116:22-139.178.68.195:55126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-137.184.1.116:22-139.178.68.195:55118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.698712 systemd[1]: sshd@20-137.184.1.116:22-139.178.68.195:55118.service: Deactivated successfully. May 10 00:50:36.703370 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:50:36.706632 systemd-logind[1179]: Session 20 logged out. Waiting for processes to exit. May 10 00:50:36.707806 systemd-logind[1179]: Removed session 20. May 10 00:50:36.749871 sshd[4778]: Accepted publickey for core from 139.178.68.195 port 55126 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:36.748000 audit[4778]: USER_ACCT pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.750000 audit[4778]: CRED_ACQ pid=4778 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.750000 audit[4778]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff2718ea50 a2=3 a3=0 items=0 ppid=1 pid=4778 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:36.750000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:36.752700 sshd[4778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:36.759863 systemd[1]: Started session-21.scope. May 10 00:50:36.760590 systemd-logind[1179]: New session 21 of user core. May 10 00:50:36.766000 audit[4778]: USER_START pid=4778 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.770000 audit[4781]: CRED_ACQ pid=4781 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.952522 sshd[4778]: pam_unix(sshd:session): session closed for user core May 10 00:50:36.953000 audit[4778]: USER_END pid=4778 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.954000 audit[4778]: CRED_DISP pid=4778 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:36.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-137.184.1.116:22-139.178.68.195:55126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:36.959029 systemd[1]: sshd@21-137.184.1.116:22-139.178.68.195:55126.service: Deactivated successfully. May 10 00:50:36.960213 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:50:36.960876 systemd-logind[1179]: Session 21 logged out. Waiting for processes to exit. May 10 00:50:36.962883 systemd-logind[1179]: Removed session 21. May 10 00:50:41.097660 systemd[1]: Started sshd@22-137.184.1.116:22-218.92.0.154:60981.service. May 10 00:50:41.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-137.184.1.116:22-218.92.0.154:60981 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:41.100683 kernel: kauditd_printk_skb: 57 callbacks suppressed May 10 00:50:41.100828 kernel: audit: type=1130 audit(1746838241.096:1487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-137.184.1.116:22-218.92.0.154:60981 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:41.961956 systemd[1]: Started sshd@23-137.184.1.116:22-139.178.68.195:55138.service. May 10 00:50:41.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-137.184.1.116:22-139.178.68.195:55138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:41.965439 kernel: audit: type=1130 audit(1746838241.961:1488): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-137.184.1.116:22-139.178.68.195:55138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:42.008000 audit[4794]: USER_ACCT pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.010012 sshd[4794]: Accepted publickey for core from 139.178.68.195 port 55138 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:42.011000 audit[4794]: CRED_ACQ pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.013978 sshd[4794]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:42.016159 kernel: audit: type=1101 audit(1746838242.008:1489): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.016562 kernel: audit: type=1103 audit(1746838242.011:1490): pid=4794 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.016623 kernel: audit: type=1006 audit(1746838242.012:1491): pid=4794 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 10 00:50:42.012000 audit[4794]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff049adf0 a2=3 a3=0 items=0 ppid=1 pid=4794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.022399 kernel: audit: type=1300 audit(1746838242.012:1491): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff049adf0 a2=3 a3=0 items=0 ppid=1 pid=4794 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.012000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:42.024214 kernel: audit: type=1327 audit(1746838242.012:1491): proctitle=737368643A20636F7265205B707269765D May 10 00:50:42.027918 systemd[1]: Started session-22.scope. May 10 00:50:42.029695 systemd-logind[1179]: New session 22 of user core. May 10 00:50:42.033000 audit[4791]: USER_AUTH pid=4791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.154 addr=218.92.0.154 terminal=ssh res=failed' May 10 00:50:42.034721 sshd[4791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154 user=root May 10 00:50:42.034000 audit[4794]: USER_START pid=4794 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.041600 kernel: audit: type=1100 audit(1746838242.033:1492): pid=4791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.154 addr=218.92.0.154 terminal=ssh res=failed' May 10 00:50:42.041735 kernel: audit: type=1105 audit(1746838242.034:1493): pid=4794 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.043268 kernel: audit: type=1103 audit(1746838242.041:1494): pid=4796 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.041000 audit[4796]: CRED_ACQ pid=4796 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.265976 sshd[4794]: pam_unix(sshd:session): session closed for user core May 10 00:50:42.267000 audit[4794]: USER_END pid=4794 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.268000 audit[4794]: CRED_DISP pid=4794 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:42.272224 systemd-logind[1179]: Session 22 logged out. Waiting for processes to exit. May 10 00:50:42.273000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-137.184.1.116:22-139.178.68.195:55138 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:42.274109 systemd[1]: sshd@23-137.184.1.116:22-139.178.68.195:55138.service: Deactivated successfully. May 10 00:50:42.274981 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:50:42.276081 systemd-logind[1179]: Removed session 22. May 10 00:50:42.660000 audit[4806]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:42.660000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdc19b6b90 a2=0 a3=7ffdc19b6b7c items=0 ppid=2062 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:42.666000 audit[4806]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:50:42.666000 audit[4806]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffdc19b6b90 a2=0 a3=7ffdc19b6b7c items=0 ppid=2062 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:42.666000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:50:44.551410 sshd[4791]: Failed password for root from 218.92.0.154 port 60981 ssh2 May 10 00:50:45.121000 audit[4791]: ANOM_LOGIN_FAILURES pid=4791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' May 10 00:50:45.121000 audit[4791]: USER_AUTH pid=4791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.154 addr=218.92.0.154 terminal=ssh res=failed' May 10 00:50:45.122674 sshd[4791]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked May 10 00:50:45.150322 systemd[1]: run-containerd-runc-k8s.io-067df371e51014953c7562ffac5cb0dde475c76a9f6930803cc818b3f833e7bc-runc.j5x0cd.mount: Deactivated successfully. May 10 00:50:46.517540 kubelet[1942]: E0510 00:50:46.517452 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:47.052083 sshd[4791]: Failed password for root from 218.92.0.154 port 60981 ssh2 May 10 00:50:47.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.1.116:22-139.178.68.195:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:47.276428 kernel: kauditd_printk_skb: 11 callbacks suppressed May 10 00:50:47.276523 kernel: audit: type=1130 audit(1746838247.274:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.1.116:22-139.178.68.195:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:47.275151 systemd[1]: Started sshd@24-137.184.1.116:22-139.178.68.195:41982.service. May 10 00:50:47.349000 audit[4831]: USER_ACCT pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.352009 sshd[4831]: Accepted publickey for core from 139.178.68.195 port 41982 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:47.355309 kernel: audit: type=1101 audit(1746838247.349:1503): pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.355464 kernel: audit: type=1103 audit(1746838247.353:1504): pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.353000 audit[4831]: CRED_ACQ pid=4831 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.361070 kernel: audit: type=1006 audit(1746838247.357:1505): pid=4831 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 00:50:47.357000 audit[4831]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfaedf580 a2=3 a3=0 items=0 ppid=1 pid=4831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.357000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:47.365619 sshd[4831]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:47.365987 kernel: audit: type=1300 audit(1746838247.357:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdfaedf580 a2=3 a3=0 items=0 ppid=1 pid=4831 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:47.366071 kernel: audit: type=1327 audit(1746838247.357:1505): proctitle=737368643A20636F7265205B707269765D May 10 00:50:47.373758 systemd-logind[1179]: New session 23 of user core. May 10 00:50:47.374875 systemd[1]: Started session-23.scope. May 10 00:50:47.379000 audit[4831]: USER_START pid=4831 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.386088 kernel: audit: type=1105 audit(1746838247.379:1506): pid=4831 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.386216 kernel: audit: type=1103 audit(1746838247.384:1507): pid=4833 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.384000 audit[4833]: CRED_ACQ pid=4833 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.604302 sshd[4831]: pam_unix(sshd:session): session closed for user core May 10 00:50:47.607000 audit[4831]: USER_END pid=4831 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.614493 kernel: audit: type=1106 audit(1746838247.607:1508): pid=4831 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.613000 audit[4831]: CRED_DISP pid=4831 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.619328 kernel: audit: type=1104 audit(1746838247.613:1509): pid=4831 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:47.620197 systemd[1]: sshd@24-137.184.1.116:22-139.178.68.195:41982.service: Deactivated successfully. May 10 00:50:47.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-137.184.1.116:22-139.178.68.195:41982 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:47.622111 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:50:47.622137 systemd-logind[1179]: Session 23 logged out. Waiting for processes to exit. May 10 00:50:47.624920 systemd-logind[1179]: Removed session 23. May 10 00:50:48.209000 audit[4791]: USER_AUTH pid=4791 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.154 addr=218.92.0.154 terminal=ssh res=failed' May 10 00:50:49.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-137.184.1.116:22-218.92.0.229:39160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:49.341942 systemd[1]: Started sshd@25-137.184.1.116:22-218.92.0.229:39160.service. May 10 00:50:49.885225 sshd[4791]: Failed password for root from 218.92.0.154 port 60981 ssh2 May 10 00:50:50.249933 sshd[4843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root May 10 00:50:50.248000 audit[4843]: USER_AUTH pid=4843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' May 10 00:50:51.186000 audit[4033]: AVC avc: denied { watch } for pid=4033 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_49_29.2565944858/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c773,c865 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c773,c865 tclass=file permissive=0 May 10 00:50:51.186000 audit[4033]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c6b320 a2=fc6 a3=0 items=0 ppid=3443 pid=4033 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c773,c865 key=(null) May 10 00:50:51.186000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:50:51.298061 sshd[4791]: Received disconnect from 218.92.0.154 port 60981:11: [preauth] May 10 00:50:51.298061 sshd[4791]: Disconnected from authenticating user root 218.92.0.154 port 60981 [preauth] May 10 00:50:51.298714 sshd[4791]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.154 user=root May 10 00:50:51.300227 systemd[1]: sshd@22-137.184.1.116:22-218.92.0.154:60981.service: Deactivated successfully. May 10 00:50:51.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-137.184.1.116:22-218.92.0.154:60981 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:52.200610 sshd[4843]: Failed password for root from 218.92.0.229 port 39160 ssh2 May 10 00:50:52.253000 audit[4110]: AVC avc: denied { watch } for pid=4110 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_49_29.1909163666/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c772,c911 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c772,c911 tclass=file permissive=0 May 10 00:50:52.253000 audit[4110]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0023f2300 a2=fc6 a3=0 items=0 ppid=3969 pid=4110 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c772,c911 key=(null) May 10 00:50:52.253000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:50:52.610916 systemd[1]: Started sshd@26-137.184.1.116:22-139.178.68.195:41998.service. May 10 00:50:52.617880 kernel: kauditd_printk_skb: 11 callbacks suppressed May 10 00:50:52.618017 kernel: audit: type=1130 audit(1746838252.609:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-137.184.1.116:22-139.178.68.195:41998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:52.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-137.184.1.116:22-139.178.68.195:41998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:52.655000 audit[4847]: USER_ACCT pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.662625 kernel: audit: type=1101 audit(1746838252.655:1518): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.662694 kernel: audit: type=1103 audit(1746838252.660:1519): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.660000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.662798 sshd[4847]: Accepted publickey for core from 139.178.68.195 port 41998 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:52.661883 sshd[4847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:52.666728 kernel: audit: type=1006 audit(1746838252.660:1520): pid=4847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:50:52.660000 audit[4847]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd342ec750 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.670296 kernel: audit: type=1300 audit(1746838252.660:1520): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd342ec750 a2=3 a3=0 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:52.660000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:52.672312 kernel: audit: type=1327 audit(1746838252.660:1520): proctitle=737368643A20636F7265205B707269765D May 10 00:50:52.677784 systemd-logind[1179]: New session 24 of user core. May 10 00:50:52.678631 systemd[1]: Started session-24.scope. May 10 00:50:52.685000 audit[4847]: USER_START pid=4847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.691316 kernel: audit: type=1105 audit(1746838252.685:1521): pid=4847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.691000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.703366 kernel: audit: type=1103 audit(1746838252.691:1522): pid=4849 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.866571 sshd[4847]: pam_unix(sshd:session): session closed for user core May 10 00:50:52.867000 audit[4847]: USER_END pid=4847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.874306 kernel: audit: type=1106 audit(1746838252.867:1523): pid=4847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.874391 systemd[1]: sshd@26-137.184.1.116:22-139.178.68.195:41998.service: Deactivated successfully. May 10 00:50:52.875689 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:50:52.867000 audit[4847]: CRED_DISP pid=4847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.876821 systemd-logind[1179]: Session 24 logged out. Waiting for processes to exit. May 10 00:50:52.873000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-137.184.1.116:22-139.178.68.195:41998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:52.881397 kernel: audit: type=1104 audit(1746838252.867:1524): pid=4847 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:52.881708 systemd-logind[1179]: Removed session 24. May 10 00:50:53.334000 audit[4843]: USER_AUTH pid=4843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' May 10 00:50:55.519829 kubelet[1942]: E0510 00:50:55.519762 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:50:55.697453 sshd[4843]: Failed password for root from 218.92.0.229 port 39160 ssh2 May 10 00:50:56.421000 audit[4843]: USER_AUTH pid=4843 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' May 10 00:50:57.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-137.184.1.116:22-139.178.68.195:49590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:57.873065 systemd[1]: Started sshd@27-137.184.1.116:22-139.178.68.195:49590.service. May 10 00:50:57.878146 kernel: kauditd_printk_skb: 3 callbacks suppressed May 10 00:50:57.878286 kernel: audit: type=1130 audit(1746838257.873:1528): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-137.184.1.116:22-139.178.68.195:49590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:57.939000 audit[4899]: USER_ACCT pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:57.943156 sshd[4899]: Accepted publickey for core from 139.178.68.195 port 49590 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:50:57.943808 kernel: audit: type=1101 audit(1746838257.939:1529): pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:57.944000 audit[4899]: CRED_ACQ pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:57.945187 sshd[4899]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:50:57.949973 kernel: audit: type=1103 audit(1746838257.944:1530): pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:57.950131 kernel: audit: type=1006 audit(1746838257.944:1531): pid=4899 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 00:50:57.953545 kernel: audit: type=1300 audit(1746838257.944:1531): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43c93650 a2=3 a3=0 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.953993 kernel: audit: type=1327 audit(1746838257.944:1531): proctitle=737368643A20636F7265205B707269765D May 10 00:50:57.944000 audit[4899]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43c93650 a2=3 a3=0 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:50:57.944000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:50:57.958493 systemd-logind[1179]: New session 25 of user core. May 10 00:50:57.960142 systemd[1]: Started session-25.scope. May 10 00:50:57.966000 audit[4899]: USER_START pid=4899 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:57.971447 kernel: audit: type=1105 audit(1746838257.966:1532): pid=4899 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:57.970000 audit[4901]: CRED_ACQ pid=4901 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:57.976328 kernel: audit: type=1103 audit(1746838257.970:1533): pid=4901 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:58.144790 sshd[4899]: pam_unix(sshd:session): session closed for user core May 10 00:50:58.149000 audit[4899]: USER_END pid=4899 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:58.154659 kernel: audit: type=1106 audit(1746838258.149:1534): pid=4899 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:58.154720 kernel: audit: type=1104 audit(1746838258.149:1535): pid=4899 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:58.149000 audit[4899]: CRED_DISP pid=4899 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:50:58.152143 systemd[1]: sshd@27-137.184.1.116:22-139.178.68.195:49590.service: Deactivated successfully. May 10 00:50:58.153551 systemd[1]: session-25.scope: Deactivated successfully. May 10 00:50:58.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-137.184.1.116:22-139.178.68.195:49590 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:58.159406 systemd-logind[1179]: Session 25 logged out. Waiting for processes to exit. May 10 00:50:58.161287 systemd-logind[1179]: Removed session 25. May 10 00:50:58.196448 sshd[4843]: Failed password for root from 218.92.0.229 port 39160 ssh2 May 10 00:50:59.507213 sshd[4843]: Received disconnect from 218.92.0.229 port 39160:11: [preauth] May 10 00:50:59.507213 sshd[4843]: Disconnected from authenticating user root 218.92.0.229 port 39160 [preauth] May 10 00:50:59.507790 sshd[4843]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root May 10 00:50:59.509039 systemd[1]: sshd@25-137.184.1.116:22-218.92.0.229:39160.service: Deactivated successfully. May 10 00:50:59.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-137.184.1.116:22-218.92.0.229:39160 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:59.672000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-137.184.1.116:22-218.92.0.229:56560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:50:59.672199 systemd[1]: Started sshd@28-137.184.1.116:22-218.92.0.229:56560.service. May 10 00:51:00.651845 sshd[4912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root May 10 00:51:00.652000 audit[4912]: USER_AUTH pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' May 10 00:51:02.063000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:02.063000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:02.063000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002bcdf60 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:51:02.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:02.063000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023b4450 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:51:02.063000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:02.305853 sshd[4912]: Failed password for root from 218.92.0.229 port 56560 ssh2 May 10 00:51:03.047000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.049008 kernel: kauditd_printk_skb: 10 callbacks suppressed May 10 00:51:03.049167 kernel: audit: type=1400 audit(1746838263.047:1542): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.047000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f753dd0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.058354 kernel: audit: type=1300 audit(1746838263.047:1542): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f753dd0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.047000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.062920 kernel: audit: type=1327 audit(1746838263.047:1542): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.063063 kernel: audit: type=1400 audit(1746838263.049:1543): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.049000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.067274 kernel: audit: type=1300 audit(1746838263.049:1543): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00ea65da0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.049000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00ea65da0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.049000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.076003 kernel: audit: type=1327 audit(1746838263.049:1543): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.076190 kernel: audit: type=1400 audit(1746838263.049:1544): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526364 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.049000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=526364 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.049000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0113be1e0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.085067 kernel: audit: type=1300 audit(1746838263.049:1544): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0113be1e0 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.085270 kernel: audit: type=1327 audit(1746838263.049:1544): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.049000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.059000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526370 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.059000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0113be600 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.093565 kernel: audit: type=1400 audit(1746838263.059:1545): avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=526370 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.059000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.097000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=526368 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.097000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00f753e00 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.097000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.098000 audit[1791]: AVC avc: denied { watch } for pid=1791 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:03.098000 audit[1791]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c00efc0c00 a2=fc6 a3=0 items=0 ppid=1634 pid=1791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c934,c986 key=(null) May 10 00:51:03.098000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3133372E3138342E312E313136002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75 May 10 00:51:03.153110 systemd[1]: Started sshd@29-137.184.1.116:22-139.178.68.195:49602.service. May 10 00:51:03.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-137.184.1.116:22-139.178.68.195:49602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:03.222000 audit[4921]: USER_ACCT pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:03.222954 sshd[4921]: Accepted publickey for core from 139.178.68.195 port 49602 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:03.224000 audit[4921]: CRED_ACQ pid=4921 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:03.224000 audit[4921]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcddad0310 a2=3 a3=0 items=0 ppid=1 pid=4921 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:03.224000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:03.226478 sshd[4921]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:03.235091 systemd-logind[1179]: New session 26 of user core. May 10 00:51:03.235784 systemd[1]: Started session-26.scope. May 10 00:51:03.245000 audit[4921]: USER_START pid=4921 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:03.248000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:03.475517 sshd[4921]: pam_unix(sshd:session): session closed for user core May 10 00:51:03.477000 audit[4921]: USER_END pid=4921 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:03.478000 audit[4921]: CRED_DISP pid=4921 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:03.481560 systemd[1]: sshd@29-137.184.1.116:22-139.178.68.195:49602.service: Deactivated successfully. May 10 00:51:03.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-137.184.1.116:22-139.178.68.195:49602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:03.482981 systemd[1]: session-26.scope: Deactivated successfully. May 10 00:51:03.484135 systemd-logind[1179]: Session 26 logged out. Waiting for processes to exit. May 10 00:51:03.486082 systemd-logind[1179]: Removed session 26. May 10 00:51:03.749000 audit[4912]: USER_AUTH pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' May 10 00:51:05.509098 kubelet[1942]: E0510 00:51:05.509053 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" May 10 00:51:05.817028 sshd[4912]: Failed password for root from 218.92.0.229 port 56560 ssh2 May 10 00:51:06.846000 audit[4912]: USER_AUTH pid=4912 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' May 10 00:51:07.401000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:07.401000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002b4fa60 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:51:07.402000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:07.402000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002cf2460 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:51:07.402000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:07.402000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:07.402000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002cf2480 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:51:07.402000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:07.401000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:07.403000 audit[1823]: AVC avc: denied { watch } for pid=1823 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=526362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:51:07.403000 audit[1823]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002cf27a0 a2=fc6 a3=0 items=0 ppid=1654 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c5,c756 key=(null) May 10 00:51:07.403000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:51:08.484880 kernel: kauditd_printk_skb: 33 callbacks suppressed May 10 00:51:08.485068 kernel: audit: type=1130 audit(1746838268.483:1563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-137.184.1.116:22-139.178.68.195:43916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:08.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-137.184.1.116:22-139.178.68.195:43916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:08.483370 systemd[1]: Started sshd@30-137.184.1.116:22-139.178.68.195:43916.service. May 10 00:51:08.550000 audit[4936]: USER_ACCT pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.550987 sshd[4936]: Accepted publickey for core from 139.178.68.195 port 43916 ssh2: RSA SHA256:CpehbxGHyxG13HTemKNgDBBE7LfF0oE1uwlsqqi3JF8 May 10 00:51:08.555281 kernel: audit: type=1101 audit(1746838268.550:1564): pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.555000 audit[4936]: CRED_ACQ pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.560339 kernel: audit: type=1103 audit(1746838268.555:1565): pid=4936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.560468 kernel: audit: type=1006 audit(1746838268.555:1566): pid=4936 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 10 00:51:08.560776 sshd[4936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:51:08.555000 audit[4936]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc08702120 a2=3 a3=0 items=0 ppid=1 pid=4936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:08.567177 kernel: audit: type=1300 audit(1746838268.555:1566): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc08702120 a2=3 a3=0 items=0 ppid=1 pid=4936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:51:08.555000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:51:08.569332 kernel: audit: type=1327 audit(1746838268.555:1566): proctitle=737368643A20636F7265205B707269765D May 10 00:51:08.575927 systemd[1]: Started session-27.scope. May 10 00:51:08.576782 systemd-logind[1179]: New session 27 of user core. May 10 00:51:08.582000 audit[4936]: USER_START pid=4936 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.587299 kernel: audit: type=1105 audit(1746838268.582:1567): pid=4936 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.588527 kernel: audit: type=1103 audit(1746838268.587:1568): pid=4938 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.587000 audit[4938]: CRED_ACQ pid=4938 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.749646 sshd[4936]: pam_unix(sshd:session): session closed for user core May 10 00:51:08.751000 audit[4936]: USER_END pid=4936 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.758400 kernel: audit: type=1106 audit(1746838268.751:1569): pid=4936 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.758526 kernel: audit: type=1104 audit(1746838268.751:1570): pid=4936 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.751000 audit[4936]: CRED_DISP pid=4936 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' May 10 00:51:08.757098 systemd[1]: sshd@30-137.184.1.116:22-139.178.68.195:43916.service: Deactivated successfully. May 10 00:51:08.758179 systemd[1]: session-27.scope: Deactivated successfully. May 10 00:51:08.760123 systemd-logind[1179]: Session 27 logged out. Waiting for processes to exit. May 10 00:51:08.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-137.184.1.116:22-139.178.68.195:43916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:08.761777 systemd-logind[1179]: Removed session 27. May 10 00:51:08.994219 sshd[4912]: Failed password for root from 218.92.0.229 port 56560 ssh2 May 10 00:51:09.944690 sshd[4912]: Received disconnect from 218.92.0.229 port 56560:11: [preauth] May 10 00:51:09.944690 sshd[4912]: Disconnected from authenticating user root 218.92.0.229 port 56560 [preauth] May 10 00:51:09.944709 sshd[4912]: PAM 2 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root May 10 00:51:09.946204 systemd[1]: sshd@28-137.184.1.116:22-218.92.0.229:56560.service: Deactivated successfully. May 10 00:51:09.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-137.184.1.116:22-218.92.0.229:56560 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:10.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-137.184.1.116:22-218.92.0.229:45264 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:51:10.077071 systemd[1]: Started sshd@31-137.184.1.116:22-218.92.0.229:45264.service. May 10 00:51:11.227458 sshd[4949]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.229 user=root May 10 00:51:11.227000 audit[4949]: USER_AUTH pid=4949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=218.92.0.229 addr=218.92.0.229 terminal=ssh res=failed' May 10 00:51:11.509548 kubelet[1942]: E0510 00:51:11.509429 1942 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2"