May 10 00:44:02.127235 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 00:44:02.127286 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:02.127304 kernel: BIOS-provided physical RAM map: May 10 00:44:02.127318 kernel: BIOS-e820: [mem 0x0000000000000000-0x0000000000000fff] reserved May 10 00:44:02.127331 kernel: BIOS-e820: [mem 0x0000000000001000-0x0000000000054fff] usable May 10 00:44:02.127344 kernel: BIOS-e820: [mem 0x0000000000055000-0x000000000005ffff] reserved May 10 00:44:02.127364 kernel: BIOS-e820: [mem 0x0000000000060000-0x0000000000097fff] usable May 10 00:44:02.127378 kernel: BIOS-e820: [mem 0x0000000000098000-0x000000000009ffff] reserved May 10 00:44:02.127406 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bd277fff] usable May 10 00:44:02.127418 kernel: BIOS-e820: [mem 0x00000000bd278000-0x00000000bd281fff] ACPI data May 10 00:44:02.127430 kernel: BIOS-e820: [mem 0x00000000bd282000-0x00000000bf8ecfff] usable May 10 00:44:02.127443 kernel: BIOS-e820: [mem 0x00000000bf8ed000-0x00000000bfb6cfff] reserved May 10 00:44:02.127457 kernel: BIOS-e820: [mem 0x00000000bfb6d000-0x00000000bfb7efff] ACPI data May 10 00:44:02.127471 kernel: BIOS-e820: [mem 0x00000000bfb7f000-0x00000000bfbfefff] ACPI NVS May 10 00:44:02.127493 kernel: BIOS-e820: [mem 0x00000000bfbff000-0x00000000bffdffff] usable May 10 00:44:02.127507 kernel: BIOS-e820: [mem 0x00000000bffe0000-0x00000000bfffffff] reserved May 10 00:44:02.127523 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000021fffffff] usable May 10 00:44:02.127537 kernel: NX (Execute Disable) protection: active May 10 00:44:02.127552 kernel: efi: EFI v2.70 by EDK II May 10 00:44:02.127568 kernel: efi: TPMFinalLog=0xbfbf7000 ACPI=0xbfb7e000 ACPI 2.0=0xbfb7e014 SMBIOS=0xbf9e8000 RNG=0xbfb73018 TPMEventLog=0xbd278018 May 10 00:44:02.127583 kernel: random: crng init done May 10 00:44:02.127598 kernel: SMBIOS 2.4 present. May 10 00:44:02.127616 kernel: DMI: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 May 10 00:44:02.127631 kernel: Hypervisor detected: KVM May 10 00:44:02.127646 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 00:44:02.127661 kernel: kvm-clock: cpu 0, msr 122196001, primary cpu clock May 10 00:44:02.127676 kernel: kvm-clock: using sched offset of 13702914289 cycles May 10 00:44:02.127692 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 00:44:02.127707 kernel: tsc: Detected 2299.998 MHz processor May 10 00:44:02.127723 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 00:44:02.127739 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 00:44:02.127754 kernel: last_pfn = 0x220000 max_arch_pfn = 0x400000000 May 10 00:44:02.127773 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 00:44:02.127788 kernel: last_pfn = 0xbffe0 max_arch_pfn = 0x400000000 May 10 00:44:02.127803 kernel: Using GB pages for direct mapping May 10 00:44:02.127818 kernel: Secure boot disabled May 10 00:44:02.127834 kernel: ACPI: Early table checksum verification disabled May 10 00:44:02.127849 kernel: ACPI: RSDP 0x00000000BFB7E014 000024 (v02 Google) May 10 00:44:02.127865 kernel: ACPI: XSDT 0x00000000BFB7D0E8 00005C (v01 Google GOOGFACP 00000001 01000013) May 10 00:44:02.127881 kernel: ACPI: FACP 0x00000000BFB78000 0000F4 (v02 Google GOOGFACP 00000001 GOOG 00000001) May 10 00:44:02.127905 kernel: ACPI: DSDT 0x00000000BFB79000 001A64 (v01 Google GOOGDSDT 00000001 GOOG 00000001) May 10 00:44:02.127921 kernel: ACPI: FACS 0x00000000BFBF2000 000040 May 10 00:44:02.127937 kernel: ACPI: SSDT 0x00000000BFB7C000 000316 (v02 GOOGLE Tpm2Tabl 00001000 INTL 20240322) May 10 00:44:02.127954 kernel: ACPI: TPM2 0x00000000BFB7B000 000034 (v04 GOOGLE 00000001 GOOG 00000001) May 10 00:44:02.127971 kernel: ACPI: SRAT 0x00000000BFB77000 0000C8 (v03 Google GOOGSRAT 00000001 GOOG 00000001) May 10 00:44:02.127987 kernel: ACPI: APIC 0x00000000BFB76000 000076 (v05 Google GOOGAPIC 00000001 GOOG 00000001) May 10 00:44:02.128007 kernel: ACPI: SSDT 0x00000000BFB75000 000980 (v01 Google GOOGSSDT 00000001 GOOG 00000001) May 10 00:44:02.128023 kernel: ACPI: WAET 0x00000000BFB74000 000028 (v01 Google GOOGWAET 00000001 GOOG 00000001) May 10 00:44:02.128037 kernel: ACPI: Reserving FACP table memory at [mem 0xbfb78000-0xbfb780f3] May 10 00:44:02.128052 kernel: ACPI: Reserving DSDT table memory at [mem 0xbfb79000-0xbfb7aa63] May 10 00:44:02.128068 kernel: ACPI: Reserving FACS table memory at [mem 0xbfbf2000-0xbfbf203f] May 10 00:44:02.128084 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb7c000-0xbfb7c315] May 10 00:44:02.128100 kernel: ACPI: Reserving TPM2 table memory at [mem 0xbfb7b000-0xbfb7b033] May 10 00:44:02.128117 kernel: ACPI: Reserving SRAT table memory at [mem 0xbfb77000-0xbfb770c7] May 10 00:44:02.128133 kernel: ACPI: Reserving APIC table memory at [mem 0xbfb76000-0xbfb76075] May 10 00:44:02.128154 kernel: ACPI: Reserving SSDT table memory at [mem 0xbfb75000-0xbfb7597f] May 10 00:44:02.128170 kernel: ACPI: Reserving WAET table memory at [mem 0xbfb74000-0xbfb74027] May 10 00:44:02.128187 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 May 10 00:44:02.128203 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 May 10 00:44:02.128220 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] May 10 00:44:02.128237 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0xbfffffff] May 10 00:44:02.128260 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x21fffffff] May 10 00:44:02.128277 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0xbfffffff] -> [mem 0x00000000-0xbfffffff] May 10 00:44:02.128294 kernel: NUMA: Node 0 [mem 0x00000000-0xbfffffff] + [mem 0x100000000-0x21fffffff] -> [mem 0x00000000-0x21fffffff] May 10 00:44:02.128315 kernel: NODE_DATA(0) allocated [mem 0x21fffa000-0x21fffffff] May 10 00:44:02.128332 kernel: Zone ranges: May 10 00:44:02.128349 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 00:44:02.128365 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 10 00:44:02.128382 kernel: Normal [mem 0x0000000100000000-0x000000021fffffff] May 10 00:44:02.130948 kernel: Movable zone start for each node May 10 00:44:02.131123 kernel: Early memory node ranges May 10 00:44:02.131144 kernel: node 0: [mem 0x0000000000001000-0x0000000000054fff] May 10 00:44:02.131161 kernel: node 0: [mem 0x0000000000060000-0x0000000000097fff] May 10 00:44:02.131184 kernel: node 0: [mem 0x0000000000100000-0x00000000bd277fff] May 10 00:44:02.131342 kernel: node 0: [mem 0x00000000bd282000-0x00000000bf8ecfff] May 10 00:44:02.131360 kernel: node 0: [mem 0x00000000bfbff000-0x00000000bffdffff] May 10 00:44:02.131377 kernel: node 0: [mem 0x0000000100000000-0x000000021fffffff] May 10 00:44:02.131414 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000021fffffff] May 10 00:44:02.131432 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 00:44:02.131448 kernel: On node 0, zone DMA: 11 pages in unavailable ranges May 10 00:44:02.131604 kernel: On node 0, zone DMA: 104 pages in unavailable ranges May 10 00:44:02.131624 kernel: On node 0, zone DMA32: 10 pages in unavailable ranges May 10 00:44:02.131646 kernel: On node 0, zone DMA32: 786 pages in unavailable ranges May 10 00:44:02.131663 kernel: On node 0, zone Normal: 32 pages in unavailable ranges May 10 00:44:02.131679 kernel: ACPI: PM-Timer IO Port: 0xb008 May 10 00:44:02.131694 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 00:44:02.131807 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 00:44:02.131827 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 00:44:02.131845 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 00:44:02.131862 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 00:44:02.131878 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 00:44:02.131899 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 00:44:02.131917 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 00:44:02.131933 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 10 00:44:02.131950 kernel: Booting paravirtualized kernel on KVM May 10 00:44:02.131967 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 00:44:02.131983 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 00:44:02.131999 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 00:44:02.132015 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 00:44:02.132031 kernel: pcpu-alloc: [0] 0 1 May 10 00:44:02.132052 kernel: kvm-guest: PV spinlocks enabled May 10 00:44:02.132069 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 10 00:44:02.132085 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1932270 May 10 00:44:02.132102 kernel: Policy zone: Normal May 10 00:44:02.132121 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:02.132139 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 00:44:02.132156 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) May 10 00:44:02.132173 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 00:44:02.132190 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 00:44:02.132211 kernel: Memory: 7515412K/7860544K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 344872K reserved, 0K cma-reserved) May 10 00:44:02.132228 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 00:44:02.132245 kernel: Kernel/User page tables isolation: enabled May 10 00:44:02.132270 kernel: ftrace: allocating 34584 entries in 136 pages May 10 00:44:02.132286 kernel: ftrace: allocated 136 pages with 2 groups May 10 00:44:02.132303 kernel: rcu: Hierarchical RCU implementation. May 10 00:44:02.132321 kernel: rcu: RCU event tracing is enabled. May 10 00:44:02.132338 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 00:44:02.132359 kernel: Rude variant of Tasks RCU enabled. May 10 00:44:02.132478 kernel: Tracing variant of Tasks RCU enabled. May 10 00:44:02.132497 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 00:44:02.132519 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 00:44:02.132536 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 00:44:02.132553 kernel: Console: colour dummy device 80x25 May 10 00:44:02.132570 kernel: printk: console [ttyS0] enabled May 10 00:44:02.132586 kernel: ACPI: Core revision 20210730 May 10 00:44:02.132603 kernel: APIC: Switch to symmetric I/O mode setup May 10 00:44:02.132621 kernel: x2apic enabled May 10 00:44:02.132643 kernel: Switched APIC routing to physical x2apic. May 10 00:44:02.132661 kernel: ..TIMER: vector=0x30 apic1=0 pin1=0 apic2=-1 pin2=-1 May 10 00:44:02.132679 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 10 00:44:02.132698 kernel: Calibrating delay loop (skipped) preset value.. 4599.99 BogoMIPS (lpj=2299998) May 10 00:44:02.132716 kernel: Last level iTLB entries: 4KB 1024, 2MB 1024, 4MB 1024 May 10 00:44:02.132734 kernel: Last level dTLB entries: 4KB 1024, 2MB 1024, 4MB 1024, 1GB 4 May 10 00:44:02.132751 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 00:44:02.132773 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on vm exit May 10 00:44:02.132791 kernel: Spectre V2 : Spectre BHI mitigation: SW BHB clearing on syscall May 10 00:44:02.132809 kernel: Spectre V2 : Mitigation: IBRS May 10 00:44:02.132827 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 00:44:02.132844 kernel: RETBleed: Mitigation: IBRS May 10 00:44:02.132862 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 10 00:44:02.132879 kernel: Spectre V2 : User space: Mitigation: STIBP via seccomp and prctl May 10 00:44:02.132897 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 10 00:44:02.132915 kernel: MDS: Mitigation: Clear CPU buffers May 10 00:44:02.132936 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode May 10 00:44:02.132954 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 10 00:44:02.132972 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 10 00:44:02.132990 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 10 00:44:02.133008 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 10 00:44:02.133026 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 10 00:44:02.133044 kernel: Freeing SMP alternatives memory: 32K May 10 00:44:02.133062 kernel: pid_max: default: 32768 minimum: 301 May 10 00:44:02.133080 kernel: LSM: Security Framework initializing May 10 00:44:02.133101 kernel: SELinux: Initializing. May 10 00:44:02.133119 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:44:02.133136 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) May 10 00:44:02.133154 kernel: smpboot: CPU0: Intel(R) Xeon(R) CPU @ 2.30GHz (family: 0x6, model: 0x3f, stepping: 0x0) May 10 00:44:02.133172 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. May 10 00:44:02.133190 kernel: signal: max sigframe size: 1776 May 10 00:44:02.133207 kernel: rcu: Hierarchical SRCU implementation. May 10 00:44:02.133225 kernel: NMI watchdog: Perf NMI watchdog permanently disabled May 10 00:44:02.133243 kernel: smp: Bringing up secondary CPUs ... May 10 00:44:02.133273 kernel: x86: Booting SMP configuration: May 10 00:44:02.133290 kernel: .... node #0, CPUs: #1 May 10 00:44:02.133308 kernel: kvm-clock: cpu 1, msr 122196041, secondary cpu clock May 10 00:44:02.133327 kernel: MDS CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/mds.html for more details. May 10 00:44:02.133346 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. May 10 00:44:02.133364 kernel: smp: Brought up 1 node, 2 CPUs May 10 00:44:02.133381 kernel: smpboot: Max logical packages: 1 May 10 00:44:02.133410 kernel: smpboot: Total of 2 processors activated (9199.99 BogoMIPS) May 10 00:44:02.133439 kernel: devtmpfs: initialized May 10 00:44:02.133453 kernel: x86/mm: Memory block size: 128MB May 10 00:44:02.133468 kernel: ACPI: PM: Registering ACPI NVS region [mem 0xbfb7f000-0xbfbfefff] (524288 bytes) May 10 00:44:02.133484 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 00:44:02.133499 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 00:44:02.133515 kernel: pinctrl core: initialized pinctrl subsystem May 10 00:44:02.133529 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 00:44:02.133546 kernel: audit: initializing netlink subsys (disabled) May 10 00:44:02.133561 kernel: audit: type=2000 audit(1746837841.261:1): state=initialized audit_enabled=0 res=1 May 10 00:44:02.133583 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 00:44:02.133599 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 00:44:02.133614 kernel: cpuidle: using governor menu May 10 00:44:02.133630 kernel: ACPI: bus type PCI registered May 10 00:44:02.133646 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 00:44:02.133663 kernel: dca service started, version 1.12.1 May 10 00:44:02.133681 kernel: PCI: Using configuration type 1 for base access May 10 00:44:02.133698 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 00:44:02.133715 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 10 00:44:02.133736 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 00:44:02.133753 kernel: ACPI: Added _OSI(Module Device) May 10 00:44:02.133771 kernel: ACPI: Added _OSI(Processor Device) May 10 00:44:02.133788 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 00:44:02.133806 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 00:44:02.133822 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 00:44:02.133839 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 00:44:02.133857 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 00:44:02.133875 kernel: ACPI: 3 ACPI AML tables successfully acquired and loaded May 10 00:44:02.133895 kernel: ACPI: Interpreter enabled May 10 00:44:02.133912 kernel: ACPI: PM: (supports S0 S3 S5) May 10 00:44:02.133930 kernel: ACPI: Using IOAPIC for interrupt routing May 10 00:44:02.133947 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 00:44:02.133964 kernel: ACPI: Enabled 16 GPEs in block 00 to 0F May 10 00:44:02.133982 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 00:44:02.134215 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 00:44:02.139274 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 00:44:02.139323 kernel: PCI host bridge to bus 0000:00 May 10 00:44:02.139935 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 00:44:02.140168 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 00:44:02.140329 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 00:44:02.144502 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfefff window] May 10 00:44:02.144669 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 00:44:02.144857 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 00:44:02.145043 kernel: pci 0000:00:01.0: [8086:7110] type 00 class 0x060100 May 10 00:44:02.145219 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 10 00:44:02.145417 kernel: pci 0000:00:01.3: quirk: [io 0xb000-0xb03f] claimed by PIIX4 ACPI May 10 00:44:02.145599 kernel: pci 0000:00:03.0: [1af4:1004] type 00 class 0x000000 May 10 00:44:02.145772 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc040-0xc07f] May 10 00:44:02.145941 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc0001000-0xc000107f] May 10 00:44:02.146130 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 10 00:44:02.146310 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc03f] May 10 00:44:02.146495 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc0000000-0xc000007f] May 10 00:44:02.146669 kernel: pci 0000:00:05.0: [1af4:1005] type 00 class 0x00ff00 May 10 00:44:02.146839 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc080-0xc09f] May 10 00:44:02.147006 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xc0002000-0xc000203f] May 10 00:44:02.147029 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 00:44:02.147054 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 00:44:02.147073 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 00:44:02.147091 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 00:44:02.147109 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 00:44:02.147128 kernel: iommu: Default domain type: Translated May 10 00:44:02.147145 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 00:44:02.147164 kernel: vgaarb: loaded May 10 00:44:02.147182 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 00:44:02.147200 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 00:44:02.147222 kernel: PTP clock support registered May 10 00:44:02.147239 kernel: Registered efivars operations May 10 00:44:02.147266 kernel: PCI: Using ACPI for IRQ routing May 10 00:44:02.147283 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 00:44:02.147301 kernel: e820: reserve RAM buffer [mem 0x00055000-0x0005ffff] May 10 00:44:02.147319 kernel: e820: reserve RAM buffer [mem 0x00098000-0x0009ffff] May 10 00:44:02.147336 kernel: e820: reserve RAM buffer [mem 0xbd278000-0xbfffffff] May 10 00:44:02.147354 kernel: e820: reserve RAM buffer [mem 0xbf8ed000-0xbfffffff] May 10 00:44:02.147372 kernel: e820: reserve RAM buffer [mem 0xbffe0000-0xbfffffff] May 10 00:44:02.147413 kernel: clocksource: Switched to clocksource kvm-clock May 10 00:44:02.147428 kernel: VFS: Disk quotas dquot_6.6.0 May 10 00:44:02.147444 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 00:44:02.147461 kernel: pnp: PnP ACPI init May 10 00:44:02.147477 kernel: pnp: PnP ACPI: found 7 devices May 10 00:44:02.147494 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 00:44:02.147510 kernel: NET: Registered PF_INET protocol family May 10 00:44:02.147527 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) May 10 00:44:02.147544 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) May 10 00:44:02.147564 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 00:44:02.147581 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 00:44:02.147597 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) May 10 00:44:02.147614 kernel: TCP: Hash tables configured (established 65536 bind 65536) May 10 00:44:02.147630 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:44:02.147646 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) May 10 00:44:02.147663 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 00:44:02.147679 kernel: NET: Registered PF_XDP protocol family May 10 00:44:02.147836 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 00:44:02.147976 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 00:44:02.148112 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 00:44:02.148247 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfefff window] May 10 00:44:02.148796 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 00:44:02.148828 kernel: PCI: CLS 0 bytes, default 64 May 10 00:44:02.148846 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 10 00:44:02.148871 kernel: software IO TLB: mapped [mem 0x00000000b7f7f000-0x00000000bbf7f000] (64MB) May 10 00:44:02.148888 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer May 10 00:44:02.148906 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x212733415c7, max_idle_ns: 440795236380 ns May 10 00:44:02.148922 kernel: clocksource: Switched to clocksource tsc May 10 00:44:02.148940 kernel: Initialise system trusted keyrings May 10 00:44:02.148956 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 May 10 00:44:02.148973 kernel: Key type asymmetric registered May 10 00:44:02.148991 kernel: Asymmetric key parser 'x509' registered May 10 00:44:02.149007 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 00:44:02.149028 kernel: io scheduler mq-deadline registered May 10 00:44:02.149045 kernel: io scheduler kyber registered May 10 00:44:02.149061 kernel: io scheduler bfq registered May 10 00:44:02.149078 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 00:44:02.149097 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 10 00:44:02.149286 kernel: virtio-pci 0000:00:03.0: virtio_pci: leaving for legacy driver May 10 00:44:02.149310 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 May 10 00:44:02.149530 kernel: virtio-pci 0000:00:04.0: virtio_pci: leaving for legacy driver May 10 00:44:02.149555 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 10 00:44:02.149729 kernel: virtio-pci 0000:00:05.0: virtio_pci: leaving for legacy driver May 10 00:44:02.149753 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 00:44:02.149771 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 00:44:02.149790 kernel: 00:04: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A May 10 00:44:02.149808 kernel: 00:05: ttyS2 at I/O 0x3e8 (irq = 6, base_baud = 115200) is a 16550A May 10 00:44:02.149826 kernel: 00:06: ttyS3 at I/O 0x2e8 (irq = 7, base_baud = 115200) is a 16550A May 10 00:44:02.149998 kernel: tpm_tis MSFT0101:00: 2.0 TPM (device-id 0x9009, rev-id 0) May 10 00:44:02.150023 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 00:44:02.150047 kernel: i8042: Warning: Keylock active May 10 00:44:02.150065 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 00:44:02.150083 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 00:44:02.150250 kernel: rtc_cmos 00:00: RTC can wake from S4 May 10 00:44:02.150422 kernel: rtc_cmos 00:00: registered as rtc0 May 10 00:44:02.150584 kernel: rtc_cmos 00:00: setting system clock to 2025-05-10T00:44:01 UTC (1746837841) May 10 00:44:02.150736 kernel: rtc_cmos 00:00: alarms up to one day, 114 bytes nvram May 10 00:44:02.150758 kernel: intel_pstate: CPU model not supported May 10 00:44:02.150783 kernel: pstore: Registered efi as persistent store backend May 10 00:44:02.150802 kernel: NET: Registered PF_INET6 protocol family May 10 00:44:02.150820 kernel: Segment Routing with IPv6 May 10 00:44:02.150838 kernel: In-situ OAM (IOAM) with IPv6 May 10 00:44:02.150856 kernel: NET: Registered PF_PACKET protocol family May 10 00:44:02.150873 kernel: Key type dns_resolver registered May 10 00:44:02.150891 kernel: IPI shorthand broadcast: enabled May 10 00:44:02.150909 kernel: sched_clock: Marking stable (765005701, 158177409)->(992340629, -69157519) May 10 00:44:02.150927 kernel: registered taskstats version 1 May 10 00:44:02.150949 kernel: Loading compiled-in X.509 certificates May 10 00:44:02.150967 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 00:44:02.150986 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 00:44:02.151003 kernel: Key type .fscrypt registered May 10 00:44:02.151021 kernel: Key type fscrypt-provisioning registered May 10 00:44:02.151039 kernel: pstore: Using crash dump compression: deflate May 10 00:44:02.151058 kernel: ima: Allocated hash algorithm: sha1 May 10 00:44:02.151094 kernel: ima: No architecture policies found May 10 00:44:02.151112 kernel: clk: Disabling unused clocks May 10 00:44:02.151134 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 00:44:02.151152 kernel: Write protecting the kernel read-only data: 28672k May 10 00:44:02.151169 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 00:44:02.151186 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 00:44:02.151203 kernel: Run /init as init process May 10 00:44:02.151221 kernel: with arguments: May 10 00:44:02.151239 kernel: /init May 10 00:44:02.151256 kernel: with environment: May 10 00:44:02.151273 kernel: HOME=/ May 10 00:44:02.151295 kernel: TERM=linux May 10 00:44:02.151312 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 00:44:02.151334 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:44:02.151357 systemd[1]: Detected virtualization kvm. May 10 00:44:02.151376 systemd[1]: Detected architecture x86-64. May 10 00:44:02.159473 systemd[1]: Running in initrd. May 10 00:44:02.159514 systemd[1]: No hostname configured, using default hostname. May 10 00:44:02.159541 systemd[1]: Hostname set to . May 10 00:44:02.159561 systemd[1]: Initializing machine ID from VM UUID. May 10 00:44:02.159581 systemd[1]: Queued start job for default target initrd.target. May 10 00:44:02.159599 systemd[1]: Started systemd-ask-password-console.path. May 10 00:44:02.159616 systemd[1]: Reached target cryptsetup.target. May 10 00:44:02.159634 systemd[1]: Reached target paths.target. May 10 00:44:02.159650 systemd[1]: Reached target slices.target. May 10 00:44:02.159667 systemd[1]: Reached target swap.target. May 10 00:44:02.159689 systemd[1]: Reached target timers.target. May 10 00:44:02.159708 systemd[1]: Listening on iscsid.socket. May 10 00:44:02.159726 systemd[1]: Listening on iscsiuio.socket. May 10 00:44:02.159746 systemd[1]: Listening on systemd-journald-audit.socket. May 10 00:44:02.159765 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 00:44:02.159784 systemd[1]: Listening on systemd-journald.socket. May 10 00:44:02.159803 systemd[1]: Listening on systemd-networkd.socket. May 10 00:44:02.159821 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:44:02.159843 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:44:02.159861 systemd[1]: Reached target sockets.target. May 10 00:44:02.159898 systemd[1]: Starting kmod-static-nodes.service... May 10 00:44:02.159922 systemd[1]: Finished network-cleanup.service. May 10 00:44:02.159941 systemd[1]: Starting systemd-fsck-usr.service... May 10 00:44:02.159961 systemd[1]: Starting systemd-journald.service... May 10 00:44:02.159980 systemd[1]: Starting systemd-modules-load.service... May 10 00:44:02.160003 systemd[1]: Starting systemd-resolved.service... May 10 00:44:02.160023 systemd[1]: Starting systemd-vconsole-setup.service... May 10 00:44:02.160042 systemd[1]: Finished kmod-static-nodes.service. May 10 00:44:02.160063 kernel: audit: type=1130 audit(1746837842.133:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.160083 systemd[1]: Finished systemd-fsck-usr.service. May 10 00:44:02.160103 kernel: audit: type=1130 audit(1746837842.139:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.160122 systemd[1]: Finished systemd-vconsole-setup.service. May 10 00:44:02.160141 systemd[1]: Starting dracut-cmdline-ask.service... May 10 00:44:02.160164 kernel: audit: type=1130 audit(1746837842.150:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.160189 systemd-journald[190]: Journal started May 10 00:44:02.160287 systemd-journald[190]: Runtime Journal (/run/log/journal/bef8cb21a2aece58f221265fb484aa30) is 8.0M, max 148.8M, 140.8M free. May 10 00:44:02.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.133448 systemd-modules-load[191]: Inserted module 'overlay' May 10 00:44:02.164422 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 00:44:02.168418 systemd[1]: Started systemd-journald.service. May 10 00:44:02.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.179424 kernel: audit: type=1130 audit(1746837842.173:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.186997 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 00:44:02.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.195412 kernel: audit: type=1130 audit(1746837842.185:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.200468 systemd[1]: Finished dracut-cmdline-ask.service. May 10 00:44:02.209546 kernel: audit: type=1130 audit(1746837842.203:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.203000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.206072 systemd[1]: Starting dracut-cmdline.service... May 10 00:44:02.228064 systemd-resolved[192]: Positive Trust Anchors: May 10 00:44:02.228458 systemd-resolved[192]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:44:02.228547 systemd-resolved[192]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:44:02.250540 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 00:44:02.233789 systemd-resolved[192]: Defaulting to hostname 'linux'. May 10 00:44:02.254532 dracut-cmdline[205]: dracut-dracut-053 May 10 00:44:02.254532 dracut-cmdline[205]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 flatcar.first_boot=detected flatcar.oem.id=gce verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 00:44:02.268546 kernel: Bridge firewalling registered May 10 00:44:02.240085 systemd[1]: Started systemd-resolved.service. May 10 00:44:02.255580 systemd-modules-load[191]: Inserted module 'br_netfilter' May 10 00:44:02.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.280678 systemd[1]: Reached target nss-lookup.target. May 10 00:44:02.290532 kernel: audit: type=1130 audit(1746837842.279:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.295412 kernel: SCSI subsystem initialized May 10 00:44:02.315787 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 00:44:02.315870 kernel: device-mapper: uevent: version 1.0.3 May 10 00:44:02.315895 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 00:44:02.320561 systemd-modules-load[191]: Inserted module 'dm_multipath' May 10 00:44:02.321794 systemd[1]: Finished systemd-modules-load.service. May 10 00:44:02.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.337413 kernel: audit: type=1130 audit(1746837842.332:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.337383 systemd[1]: Starting systemd-sysctl.service... May 10 00:44:02.350428 systemd[1]: Finished systemd-sysctl.service. May 10 00:44:02.361554 kernel: audit: type=1130 audit(1746837842.353:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.361597 kernel: Loading iSCSI transport class v2.0-870. May 10 00:44:02.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.382426 kernel: iscsi: registered transport (tcp) May 10 00:44:02.409786 kernel: iscsi: registered transport (qla4xxx) May 10 00:44:02.409879 kernel: QLogic iSCSI HBA Driver May 10 00:44:02.454759 systemd[1]: Finished dracut-cmdline.service. May 10 00:44:02.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.460247 systemd[1]: Starting dracut-pre-udev.service... May 10 00:44:02.522483 kernel: raid6: avx2x4 gen() 18124 MB/s May 10 00:44:02.543447 kernel: raid6: avx2x4 xor() 6698 MB/s May 10 00:44:02.564468 kernel: raid6: avx2x2 gen() 18372 MB/s May 10 00:44:02.585479 kernel: raid6: avx2x2 xor() 18322 MB/s May 10 00:44:02.606469 kernel: raid6: avx2x1 gen() 14000 MB/s May 10 00:44:02.627455 kernel: raid6: avx2x1 xor() 16051 MB/s May 10 00:44:02.648440 kernel: raid6: sse2x4 gen() 11024 MB/s May 10 00:44:02.669429 kernel: raid6: sse2x4 xor() 6674 MB/s May 10 00:44:02.690475 kernel: raid6: sse2x2 gen() 12102 MB/s May 10 00:44:02.711458 kernel: raid6: sse2x2 xor() 7290 MB/s May 10 00:44:02.732442 kernel: raid6: sse2x1 gen() 10519 MB/s May 10 00:44:02.758908 kernel: raid6: sse2x1 xor() 5205 MB/s May 10 00:44:02.758973 kernel: raid6: using algorithm avx2x2 gen() 18372 MB/s May 10 00:44:02.758995 kernel: raid6: .... xor() 18322 MB/s, rmw enabled May 10 00:44:02.764116 kernel: raid6: using avx2x2 recovery algorithm May 10 00:44:02.789426 kernel: xor: automatically using best checksumming function avx May 10 00:44:02.902447 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 00:44:02.914486 systemd[1]: Finished dracut-pre-udev.service. May 10 00:44:02.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.913000 audit: BPF prog-id=7 op=LOAD May 10 00:44:02.913000 audit: BPF prog-id=8 op=LOAD May 10 00:44:02.916170 systemd[1]: Starting systemd-udevd.service... May 10 00:44:02.932993 systemd-udevd[389]: Using default interface naming scheme 'v252'. May 10 00:44:02.952734 systemd[1]: Started systemd-udevd.service. May 10 00:44:02.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:02.962832 systemd[1]: Starting dracut-pre-trigger.service... May 10 00:44:02.977999 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation May 10 00:44:03.017493 systemd[1]: Finished dracut-pre-trigger.service. May 10 00:44:03.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:03.018621 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:44:03.086327 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:44:03.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:03.163431 kernel: cryptd: max_cpu_qlen set to 1000 May 10 00:44:03.278426 kernel: scsi host0: Virtio SCSI HBA May 10 00:44:03.298425 kernel: scsi 0:0:1:0: Direct-Access Google PersistentDisk 1 PQ: 0 ANSI: 6 May 10 00:44:03.309415 kernel: AVX2 version of gcm_enc/dec engaged. May 10 00:44:03.309506 kernel: AES CTR mode by8 optimization enabled May 10 00:44:03.376591 kernel: sd 0:0:1:0: [sda] 25165824 512-byte logical blocks: (12.9 GB/12.0 GiB) May 10 00:44:03.435591 kernel: sd 0:0:1:0: [sda] 4096-byte physical blocks May 10 00:44:03.435825 kernel: sd 0:0:1:0: [sda] Write Protect is off May 10 00:44:03.435975 kernel: sd 0:0:1:0: [sda] Mode Sense: 1f 00 00 08 May 10 00:44:03.436113 kernel: sd 0:0:1:0: [sda] Write cache: enabled, read cache: enabled, doesn't support DPO or FUA May 10 00:44:03.436250 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 00:44:03.436265 kernel: GPT:17805311 != 25165823 May 10 00:44:03.436283 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 00:44:03.436296 kernel: GPT:17805311 != 25165823 May 10 00:44:03.436309 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 00:44:03.436322 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:44:03.436335 kernel: sd 0:0:1:0: [sda] Attached SCSI disk May 10 00:44:03.488431 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/sda6 scanned by (udev-worker) (440) May 10 00:44:03.503621 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 00:44:03.532639 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 00:44:03.546779 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 00:44:03.562601 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 00:44:03.587612 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:44:03.608167 systemd[1]: Starting disk-uuid.service... May 10 00:44:03.622745 disk-uuid[511]: Primary Header is updated. May 10 00:44:03.622745 disk-uuid[511]: Secondary Entries is updated. May 10 00:44:03.622745 disk-uuid[511]: Secondary Header is updated. May 10 00:44:03.648556 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:44:03.656439 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:44:04.691416 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 May 10 00:44:04.691854 disk-uuid[512]: The operation has completed successfully. May 10 00:44:04.768654 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 00:44:04.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:04.775000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:04.768798 systemd[1]: Finished disk-uuid.service. May 10 00:44:04.787054 systemd[1]: Starting verity-setup.service... May 10 00:44:04.815458 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" May 10 00:44:04.901548 systemd[1]: Found device dev-mapper-usr.device. May 10 00:44:04.904461 systemd[1]: Mounting sysusr-usr.mount... May 10 00:44:04.928093 systemd[1]: Finished verity-setup.service. May 10 00:44:04.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.015563 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:44:05.016635 systemd[1]: Mounted sysusr-usr.mount. May 10 00:44:05.017047 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 00:44:05.074963 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:44:05.075020 kernel: BTRFS info (device sda6): using free space tree May 10 00:44:05.075045 kernel: BTRFS info (device sda6): has skinny extents May 10 00:44:05.075069 kernel: BTRFS info (device sda6): enabling ssd optimizations May 10 00:44:05.018000 systemd[1]: Starting ignition-setup.service... May 10 00:44:05.038824 systemd[1]: Starting parse-ip-for-networkd.service... May 10 00:44:05.096215 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 00:44:05.112039 systemd[1]: Finished ignition-setup.service. May 10 00:44:05.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.121927 systemd[1]: Starting ignition-fetch-offline.service... May 10 00:44:05.167542 systemd[1]: Finished parse-ip-for-networkd.service. May 10 00:44:05.175000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.176000 audit: BPF prog-id=9 op=LOAD May 10 00:44:05.179230 systemd[1]: Starting systemd-networkd.service... May 10 00:44:05.212884 systemd-networkd[686]: lo: Link UP May 10 00:44:05.212903 systemd-networkd[686]: lo: Gained carrier May 10 00:44:05.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.213746 systemd-networkd[686]: Enumeration completed May 10 00:44:05.213903 systemd[1]: Started systemd-networkd.service. May 10 00:44:05.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.214305 systemd-networkd[686]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:44:05.286600 iscsid[696]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 00:44:05.286600 iscsid[696]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log May 10 00:44:05.286600 iscsid[696]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 00:44:05.286600 iscsid[696]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 00:44:05.286600 iscsid[696]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 00:44:05.286600 iscsid[696]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 00:44:05.286600 iscsid[696]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 00:44:05.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.216528 systemd-networkd[686]: eth0: Link UP May 10 00:44:05.412000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.410474 ignition[645]: Ignition 2.14.0 May 10 00:44:05.216536 systemd-networkd[686]: eth0: Gained carrier May 10 00:44:05.410488 ignition[645]: Stage: fetch-offline May 10 00:44:05.228587 systemd-networkd[686]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:44:05.410569 ignition[645]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:44:05.228611 systemd-networkd[686]: eth0: DHCPv4 address 10.128.0.17/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 10 00:44:05.410610 ignition[645]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:44:05.228734 systemd[1]: Reached target network.target. May 10 00:44:05.432900 ignition[645]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:44:05.238971 systemd[1]: Starting iscsiuio.service... May 10 00:44:05.433109 ignition[645]: parsed url from cmdline: "" May 10 00:44:05.252855 systemd[1]: Started iscsiuio.service. May 10 00:44:05.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.433115 ignition[645]: no config URL provided May 10 00:44:05.559000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.269163 systemd[1]: Starting iscsid.service... May 10 00:44:05.433123 ignition[645]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:44:05.361760 systemd[1]: Started iscsid.service. May 10 00:44:05.433134 ignition[645]: no config at "/usr/lib/ignition/user.ign" May 10 00:44:05.373208 systemd[1]: Starting dracut-initqueue.service... May 10 00:44:05.433145 ignition[645]: failed to fetch config: resource requires networking May 10 00:44:05.617000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.393340 systemd[1]: Finished dracut-initqueue.service. May 10 00:44:05.433320 ignition[645]: Ignition finished successfully May 10 00:44:05.414014 systemd[1]: Reached target remote-fs-pre.target. May 10 00:44:05.573553 ignition[711]: Ignition 2.14.0 May 10 00:44:05.448592 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:44:05.671000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.573564 ignition[711]: Stage: fetch May 10 00:44:05.477581 systemd[1]: Reached target remote-fs.target. May 10 00:44:05.573705 ignition[711]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:44:05.495896 systemd[1]: Starting dracut-pre-mount.service... May 10 00:44:05.573737 ignition[711]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:44:05.522098 systemd[1]: Finished ignition-fetch-offline.service. May 10 00:44:05.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:05.581370 ignition[711]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:44:05.546092 systemd[1]: Finished dracut-pre-mount.service. May 10 00:44:05.581629 ignition[711]: parsed url from cmdline: "" May 10 00:44:05.562194 systemd[1]: Starting ignition-fetch.service... May 10 00:44:05.581637 ignition[711]: no config URL provided May 10 00:44:05.595257 unknown[711]: fetched base config from "system" May 10 00:44:05.581645 ignition[711]: reading system config file "/usr/lib/ignition/user.ign" May 10 00:44:05.595278 unknown[711]: fetched base config from "system" May 10 00:44:05.581657 ignition[711]: no config at "/usr/lib/ignition/user.ign" May 10 00:44:05.595291 unknown[711]: fetched user config from "gcp" May 10 00:44:05.581695 ignition[711]: GET http://169.254.169.254/computeMetadata/v1/instance/attributes/user-data: attempt #1 May 10 00:44:05.599166 systemd[1]: Finished ignition-fetch.service. May 10 00:44:05.587892 ignition[711]: GET result: OK May 10 00:44:05.620244 systemd[1]: Starting ignition-kargs.service... May 10 00:44:05.588044 ignition[711]: parsing config with SHA512: a2db84b1512c3e59d568e2d08f2fa629094aa66bc83b1e7db17ad225e6d642a45e891eb265759d354d6de802a536cd3034814c203ce41b26f91930139a9b1bb4 May 10 00:44:05.658943 systemd[1]: Finished ignition-kargs.service. May 10 00:44:05.596923 ignition[711]: fetch: fetch complete May 10 00:44:05.673904 systemd[1]: Starting ignition-disks.service... May 10 00:44:05.597224 ignition[711]: fetch: fetch passed May 10 00:44:05.695696 systemd[1]: Finished ignition-disks.service. May 10 00:44:05.597565 ignition[711]: Ignition finished successfully May 10 00:44:05.724995 systemd[1]: Reached target initrd-root-device.target. May 10 00:44:05.633930 ignition[717]: Ignition 2.14.0 May 10 00:44:05.740687 systemd[1]: Reached target local-fs-pre.target. May 10 00:44:05.633950 ignition[717]: Stage: kargs May 10 00:44:05.764626 systemd[1]: Reached target local-fs.target. May 10 00:44:05.634090 ignition[717]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:44:05.778618 systemd[1]: Reached target sysinit.target. May 10 00:44:05.634125 ignition[717]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:44:05.791614 systemd[1]: Reached target basic.target. May 10 00:44:05.641485 ignition[717]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:44:05.805875 systemd[1]: Starting systemd-fsck-root.service... May 10 00:44:05.642921 ignition[717]: kargs: kargs passed May 10 00:44:05.642986 ignition[717]: Ignition finished successfully May 10 00:44:05.685592 ignition[723]: Ignition 2.14.0 May 10 00:44:05.685601 ignition[723]: Stage: disks May 10 00:44:05.685730 ignition[723]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:44:05.685761 ignition[723]: parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:44:05.693092 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:44:05.694366 ignition[723]: disks: disks passed May 10 00:44:05.694448 ignition[723]: Ignition finished successfully May 10 00:44:05.851504 systemd-fsck[731]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 10 00:44:06.007423 systemd[1]: Finished systemd-fsck-root.service. May 10 00:44:06.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:06.008801 systemd[1]: Mounting sysroot.mount... May 10 00:44:06.037542 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:44:06.045795 systemd[1]: Mounted sysroot.mount. May 10 00:44:06.046179 systemd[1]: Reached target initrd-root-fs.target. May 10 00:44:06.067123 systemd[1]: Mounting sysroot-usr.mount... May 10 00:44:06.073296 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 00:44:06.073357 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 00:44:06.073420 systemd[1]: Reached target ignition-diskful.target. May 10 00:44:06.175577 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (737) May 10 00:44:06.175611 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:44:06.175637 kernel: BTRFS info (device sda6): using free space tree May 10 00:44:06.175652 kernel: BTRFS info (device sda6): has skinny extents May 10 00:44:06.092848 systemd[1]: Mounted sysroot-usr.mount. May 10 00:44:06.194565 kernel: BTRFS info (device sda6): enabling ssd optimizations May 10 00:44:06.119146 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:44:06.203618 initrd-setup-root[742]: cut: /sysroot/etc/passwd: No such file or directory May 10 00:44:06.147670 systemd[1]: Starting initrd-setup-root.service... May 10 00:44:06.221678 initrd-setup-root[766]: cut: /sysroot/etc/group: No such file or directory May 10 00:44:06.196259 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:44:06.247551 initrd-setup-root[776]: cut: /sysroot/etc/shadow: No such file or directory May 10 00:44:06.257543 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory May 10 00:44:06.277373 systemd[1]: Finished initrd-setup-root.service. May 10 00:44:06.317595 kernel: kauditd_printk_skb: 23 callbacks suppressed May 10 00:44:06.317646 kernel: audit: type=1130 audit(1746837846.276:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:06.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:06.278863 systemd[1]: Starting ignition-mount.service... May 10 00:44:06.325747 systemd[1]: Starting sysroot-boot.service... May 10 00:44:06.339708 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 10 00:44:06.339876 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 10 00:44:06.364543 ignition[802]: INFO : Ignition 2.14.0 May 10 00:44:06.364543 ignition[802]: INFO : Stage: mount May 10 00:44:06.364543 ignition[802]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:44:06.364543 ignition[802]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:44:06.464608 kernel: audit: type=1130 audit(1746837846.385:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:06.464659 kernel: audit: type=1130 audit(1746837846.424:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:06.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:06.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:06.372529 systemd[1]: Finished sysroot-boot.service. May 10 00:44:06.479685 ignition[802]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:44:06.479685 ignition[802]: INFO : mount: mount passed May 10 00:44:06.479685 ignition[802]: INFO : Ignition finished successfully May 10 00:44:06.540565 kernel: BTRFS: device label OEM devid 1 transid 16 /dev/sda6 scanned by mount (812) May 10 00:44:06.540607 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm May 10 00:44:06.540628 kernel: BTRFS info (device sda6): using free space tree May 10 00:44:06.540650 kernel: BTRFS info (device sda6): has skinny extents May 10 00:44:06.540673 kernel: BTRFS info (device sda6): enabling ssd optimizations May 10 00:44:06.408241 systemd[1]: Finished ignition-mount.service. May 10 00:44:06.426964 systemd[1]: Starting ignition-files.service... May 10 00:44:06.476117 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 00:44:06.541241 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 00:44:06.581826 ignition[831]: INFO : Ignition 2.14.0 May 10 00:44:06.581826 ignition[831]: INFO : Stage: files May 10 00:44:06.581826 ignition[831]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:44:06.581826 ignition[831]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:44:06.581826 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:44:06.581826 ignition[831]: DEBUG : files: compiled without relabeling support, skipping May 10 00:44:06.597754 unknown[831]: wrote ssh authorized keys file for user: core May 10 00:44:06.657565 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 00:44:06.657565 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 00:44:06.657565 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 00:44:06.657565 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 00:44:06.657565 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/etc/hosts" May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(4): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1924852644" May 10 00:44:06.657565 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(3): op(4): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1924852644": device or resource busy May 10 00:44:06.657565 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(3): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1924852644", trying btrfs: device or resource busy May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1924852644" May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(5): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1924852644" May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [started] unmounting "/mnt/oem1924852644" May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): op(6): [finished] unmounting "/mnt/oem1924852644" May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/etc/hosts" May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:44:06.657565 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 00:44:06.918558 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK May 10 00:44:06.990252 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(9): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2660950155" May 10 00:44:07.007578 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(8): op(9): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2660950155": device or resource busy May 10 00:44:07.007578 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(8): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem2660950155", trying btrfs: device or resource busy May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2660950155" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(a): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem2660950155" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [started] unmounting "/mnt/oem2660950155" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): op(b): [finished] unmounting "/mnt/oem2660950155" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/profile.d/google-cloud-sdk.sh" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/install.sh" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/install.sh" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 00:44:07.007578 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(10): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(10): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(11): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(11): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(13): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem61940262" May 10 00:44:07.253607 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(12): op(13): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem61940262": device or resource busy May 10 00:44:07.253607 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(12): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem61940262", trying btrfs: device or resource busy May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem61940262" May 10 00:44:07.253607 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(14): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem61940262" May 10 00:44:07.109583 systemd-networkd[686]: eth0: Gained IPv6LL May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [started] unmounting "/mnt/oem61940262" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): op(15): [finished] unmounting "/mnt/oem61940262" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/etc/systemd/system/oem-gce.service" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): [started] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): oem config not found in "/usr/share/oem", looking on oem partition May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(17): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3521984020" May 10 00:44:07.507629 ignition[831]: CRITICAL : files: createFilesystemsFiles: createFiles: op(16): op(17): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3521984020": device or resource busy May 10 00:44:07.507629 ignition[831]: ERROR : files: createFilesystemsFiles: createFiles: op(16): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3521984020", trying btrfs: device or resource busy May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3521984020" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(18): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3521984020" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [started] unmounting "/mnt/oem3521984020" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): op(19): [finished] unmounting "/mnt/oem3521984020" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(16): [finished] writing file "/sysroot/etc/systemd/system/oem-gce-enable-oslogin.service" May 10 00:44:07.507629 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:44:07.749593 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 00:44:07.749593 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1a): GET result: OK May 10 00:44:07.795204 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(1a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 00:44:07.795204 ignition[831]: INFO : files: op(1b): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 00:44:07.795204 ignition[831]: INFO : files: op(1b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 00:44:07.795204 ignition[831]: INFO : files: op(1c): [started] processing unit "oem-gce.service" May 10 00:44:07.795204 ignition[831]: INFO : files: op(1c): [finished] processing unit "oem-gce.service" May 10 00:44:07.795204 ignition[831]: INFO : files: op(1d): [started] processing unit "oem-gce-enable-oslogin.service" May 10 00:44:07.795204 ignition[831]: INFO : files: op(1d): [finished] processing unit "oem-gce-enable-oslogin.service" May 10 00:44:07.795204 ignition[831]: INFO : files: op(1e): [started] processing unit "prepare-helm.service" May 10 00:44:08.026569 kernel: audit: type=1130 audit(1746837847.812:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.026604 kernel: audit: type=1130 audit(1746837847.898:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.026621 kernel: audit: type=1130 audit(1746837847.940:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.026647 kernel: audit: type=1131 audit(1746837847.940:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:07.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:07.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:07.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:07.940000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:07.804275 systemd[1]: Finished ignition-files.service. May 10 00:44:08.034615 ignition[831]: INFO : files: op(1e): op(1f): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:44:08.034615 ignition[831]: INFO : files: op(1e): op(1f): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 00:44:08.034615 ignition[831]: INFO : files: op(1e): [finished] processing unit "prepare-helm.service" May 10 00:44:08.034615 ignition[831]: INFO : files: op(20): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:44:08.034615 ignition[831]: INFO : files: op(20): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 00:44:08.034615 ignition[831]: INFO : files: op(21): [started] setting preset to enabled for "oem-gce.service" May 10 00:44:08.034615 ignition[831]: INFO : files: op(21): [finished] setting preset to enabled for "oem-gce.service" May 10 00:44:08.034615 ignition[831]: INFO : files: op(22): [started] setting preset to enabled for "oem-gce-enable-oslogin.service" May 10 00:44:08.034615 ignition[831]: INFO : files: op(22): [finished] setting preset to enabled for "oem-gce-enable-oslogin.service" May 10 00:44:08.034615 ignition[831]: INFO : files: op(23): [started] setting preset to enabled for "prepare-helm.service" May 10 00:44:08.034615 ignition[831]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-helm.service" May 10 00:44:08.034615 ignition[831]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 00:44:08.034615 ignition[831]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 00:44:08.034615 ignition[831]: INFO : files: files passed May 10 00:44:08.034615 ignition[831]: INFO : Ignition finished successfully May 10 00:44:08.346625 kernel: audit: type=1130 audit(1746837848.073:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.346696 kernel: audit: type=1131 audit(1746837848.073:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.346721 kernel: audit: type=1130 audit(1746837848.259:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.073000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:07.823573 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 00:44:07.851825 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 00:44:08.370000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.388697 initrd-setup-root-after-ignition[854]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 00:44:07.852957 systemd[1]: Starting ignition-quench.service... May 10 00:44:07.878997 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 00:44:07.900072 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 00:44:07.900230 systemd[1]: Finished ignition-quench.service. May 10 00:44:07.941829 systemd[1]: Reached target ignition-complete.target. May 10 00:44:08.015698 systemd[1]: Starting initrd-parse-etc.service... May 10 00:44:08.070747 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 00:44:08.070875 systemd[1]: Finished initrd-parse-etc.service. May 10 00:44:08.075066 systemd[1]: Reached target initrd-fs.target. May 10 00:44:08.151748 systemd[1]: Reached target initrd.target. May 10 00:44:08.183787 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 00:44:08.185155 systemd[1]: Starting dracut-pre-pivot.service... May 10 00:44:08.230000 systemd[1]: Finished dracut-pre-pivot.service. May 10 00:44:08.262264 systemd[1]: Starting initrd-cleanup.service... May 10 00:44:08.290773 systemd[1]: Stopped target nss-lookup.target. May 10 00:44:08.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.309986 systemd[1]: Stopped target remote-cryptsetup.target. May 10 00:44:08.326085 systemd[1]: Stopped target timers.target. May 10 00:44:08.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.353869 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 00:44:08.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.354063 systemd[1]: Stopped dracut-pre-pivot.service. May 10 00:44:08.663000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.372070 systemd[1]: Stopped target initrd.target. May 10 00:44:08.678601 ignition[869]: INFO : Ignition 2.14.0 May 10 00:44:08.678601 ignition[869]: INFO : Stage: umount May 10 00:44:08.678601 ignition[869]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 00:44:08.678601 ignition[869]: DEBUG : parsing config with SHA512: 28536912712fffc63406b6accf8759a9de2528d78fa3e153de6c4a0ac81102f9876238326a650eaef6ce96ba6e26bae8fbbfe85a3f956a15fdad11da447b6af6 May 10 00:44:08.719000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.395933 systemd[1]: Stopped target basic.target. May 10 00:44:08.754780 ignition[869]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/gcp" May 10 00:44:08.754780 ignition[869]: INFO : umount: umount passed May 10 00:44:08.754780 ignition[869]: INFO : Ignition finished successfully May 10 00:44:08.761000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.418032 systemd[1]: Stopped target ignition-complete.target. May 10 00:44:08.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.432982 systemd[1]: Stopped target ignition-diskful.target. May 10 00:44:08.826000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.448947 systemd[1]: Stopped target initrd-root-device.target. May 10 00:44:08.843000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.464904 systemd[1]: Stopped target remote-fs.target. May 10 00:44:08.479879 systemd[1]: Stopped target remote-fs-pre.target. May 10 00:44:08.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.495912 systemd[1]: Stopped target sysinit.target. May 10 00:44:08.513920 systemd[1]: Stopped target local-fs.target. May 10 00:44:08.535933 systemd[1]: Stopped target local-fs-pre.target. May 10 00:44:08.555954 systemd[1]: Stopped target swap.target. May 10 00:44:08.579855 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 00:44:08.580086 systemd[1]: Stopped dracut-pre-mount.service. May 10 00:44:08.968000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.601054 systemd[1]: Stopped target cryptsetup.target. May 10 00:44:08.616905 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 00:44:08.617106 systemd[1]: Stopped dracut-initqueue.service. May 10 00:44:08.626110 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 00:44:08.626296 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 00:44:08.649027 systemd[1]: ignition-files.service: Deactivated successfully. May 10 00:44:09.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.649211 systemd[1]: Stopped ignition-files.service. May 10 00:44:09.054000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.666469 systemd[1]: Stopping ignition-mount.service... May 10 00:44:09.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.069000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.700597 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 00:44:09.083000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.083000 audit: BPF prog-id=6 op=UNLOAD May 10 00:44:08.700857 systemd[1]: Stopped kmod-static-nodes.service. May 10 00:44:08.722216 systemd[1]: Stopping sysroot-boot.service... May 10 00:44:09.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.747601 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 00:44:08.747912 systemd[1]: Stopped systemd-udev-trigger.service. May 10 00:44:09.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.762905 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 00:44:09.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.763100 systemd[1]: Stopped dracut-pre-trigger.service. May 10 00:44:09.184000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.786495 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 00:44:08.787770 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 00:44:08.787887 systemd[1]: Stopped ignition-mount.service. May 10 00:44:09.220000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.790418 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 00:44:08.790570 systemd[1]: Stopped ignition-disks.service. May 10 00:44:08.811808 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 00:44:09.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.811886 systemd[1]: Stopped ignition-kargs.service. May 10 00:44:09.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.827815 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 00:44:09.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.827886 systemd[1]: Stopped ignition-fetch.service. May 10 00:44:08.844700 systemd[1]: Stopped target network.target. May 10 00:44:08.860602 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 00:44:09.337000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.860718 systemd[1]: Stopped ignition-fetch-offline.service. May 10 00:44:09.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.876712 systemd[1]: Stopped target paths.target. May 10 00:44:09.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:09.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:08.891586 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 00:44:08.895540 systemd[1]: Stopped systemd-ask-password-console.path. May 10 00:44:08.908630 systemd[1]: Stopped target slices.target. May 10 00:44:08.921594 systemd[1]: Stopped target sockets.target. May 10 00:44:08.935673 systemd[1]: iscsid.socket: Deactivated successfully. May 10 00:44:09.448091 systemd-journald[190]: Received SIGTERM from PID 1 (n/a). May 10 00:44:08.935746 systemd[1]: Closed iscsid.socket. May 10 00:44:09.455562 iscsid[696]: iscsid shutting down. May 10 00:44:08.935870 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 00:44:08.935908 systemd[1]: Closed iscsiuio.socket. May 10 00:44:08.953628 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 00:44:08.953723 systemd[1]: Stopped ignition-setup.service. May 10 00:44:08.969983 systemd[1]: Stopping systemd-networkd.service... May 10 00:44:08.973493 systemd-networkd[686]: eth0: DHCPv6 lease lost May 10 00:44:08.983774 systemd[1]: Stopping systemd-resolved.service... May 10 00:44:09.014298 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 00:44:09.014448 systemd[1]: Stopped systemd-resolved.service. May 10 00:44:09.040471 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 00:44:09.040608 systemd[1]: Stopped systemd-networkd.service. May 10 00:44:09.056628 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 00:44:09.056746 systemd[1]: Finished initrd-cleanup.service. May 10 00:44:09.071040 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 00:44:09.071155 systemd[1]: Stopped sysroot-boot.service. May 10 00:44:09.085843 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 00:44:09.085885 systemd[1]: Closed systemd-networkd.socket. May 10 00:44:09.103726 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 00:44:09.103828 systemd[1]: Stopped initrd-setup-root.service. May 10 00:44:09.119795 systemd[1]: Stopping network-cleanup.service... May 10 00:44:09.132740 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 00:44:09.132842 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 00:44:09.151759 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 00:44:09.151840 systemd[1]: Stopped systemd-sysctl.service. May 10 00:44:09.167801 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 00:44:09.167869 systemd[1]: Stopped systemd-modules-load.service. May 10 00:44:09.185903 systemd[1]: Stopping systemd-udevd.service... May 10 00:44:09.201334 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 00:44:09.202027 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 00:44:09.202183 systemd[1]: Stopped systemd-udevd.service. May 10 00:44:09.223147 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 00:44:09.223254 systemd[1]: Closed systemd-udevd-control.socket. May 10 00:44:09.237664 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 00:44:09.237739 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 00:44:09.253636 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 00:44:09.253766 systemd[1]: Stopped dracut-pre-udev.service. May 10 00:44:09.268751 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 00:44:09.268837 systemd[1]: Stopped dracut-cmdline.service. May 10 00:44:09.284704 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 00:44:09.284785 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 00:44:09.300735 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 00:44:09.324571 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 00:44:09.324701 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 00:44:09.339242 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 00:44:09.339374 systemd[1]: Stopped network-cleanup.service. May 10 00:44:09.358051 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 00:44:09.358178 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 00:44:09.373921 systemd[1]: Reached target initrd-switch-root.target. May 10 00:44:09.389732 systemd[1]: Starting initrd-switch-root.service... May 10 00:44:09.415556 systemd[1]: Switching root. May 10 00:44:09.457844 systemd-journald[190]: Journal stopped May 10 00:44:14.305975 kernel: SELinux: Class mctp_socket not defined in policy. May 10 00:44:14.306113 kernel: SELinux: Class anon_inode not defined in policy. May 10 00:44:14.306140 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 00:44:14.306163 kernel: SELinux: policy capability network_peer_controls=1 May 10 00:44:14.306186 kernel: SELinux: policy capability open_perms=1 May 10 00:44:14.306352 kernel: SELinux: policy capability extended_socket_class=1 May 10 00:44:14.306382 kernel: SELinux: policy capability always_check_network=0 May 10 00:44:14.306419 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 00:44:14.306443 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 00:44:14.306471 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 00:44:14.306496 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 00:44:14.306521 systemd[1]: Successfully loaded SELinux policy in 119.617ms. May 10 00:44:14.306569 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 10.730ms. May 10 00:44:14.306596 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 00:44:14.306622 systemd[1]: Detected virtualization kvm. May 10 00:44:14.306646 systemd[1]: Detected architecture x86-64. May 10 00:44:14.306670 systemd[1]: Detected first boot. May 10 00:44:14.306699 systemd[1]: Initializing machine ID from VM UUID. May 10 00:44:14.306723 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 00:44:14.306747 systemd[1]: Populated /etc with preset unit settings. May 10 00:44:14.306775 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:14.306801 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:14.306827 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:14.306863 kernel: kauditd_printk_skb: 49 callbacks suppressed May 10 00:44:14.306887 kernel: audit: type=1334 audit(1746837853.368:86): prog-id=12 op=LOAD May 10 00:44:14.306913 kernel: audit: type=1334 audit(1746837853.368:87): prog-id=3 op=UNLOAD May 10 00:44:14.306935 kernel: audit: type=1334 audit(1746837853.380:88): prog-id=13 op=LOAD May 10 00:44:14.306957 kernel: audit: type=1334 audit(1746837853.394:89): prog-id=14 op=LOAD May 10 00:44:14.306979 kernel: audit: type=1334 audit(1746837853.394:90): prog-id=4 op=UNLOAD May 10 00:44:14.307002 kernel: audit: type=1334 audit(1746837853.394:91): prog-id=5 op=UNLOAD May 10 00:44:14.307024 kernel: audit: type=1334 audit(1746837853.401:92): prog-id=15 op=LOAD May 10 00:44:14.307046 kernel: audit: type=1334 audit(1746837853.401:93): prog-id=12 op=UNLOAD May 10 00:44:14.307070 kernel: audit: type=1334 audit(1746837853.408:94): prog-id=16 op=LOAD May 10 00:44:14.307104 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 00:44:14.307128 kernel: audit: type=1334 audit(1746837853.415:95): prog-id=17 op=LOAD May 10 00:44:14.307150 systemd[1]: Stopped iscsiuio.service. May 10 00:44:14.307175 systemd[1]: iscsid.service: Deactivated successfully. May 10 00:44:14.307198 systemd[1]: Stopped iscsid.service. May 10 00:44:14.307223 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 00:44:14.307247 systemd[1]: Stopped initrd-switch-root.service. May 10 00:44:14.307272 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 00:44:14.307313 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 00:44:14.307338 systemd[1]: Created slice system-addon\x2drun.slice. May 10 00:44:14.307364 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 00:44:14.307402 systemd[1]: Created slice system-getty.slice. May 10 00:44:14.307439 systemd[1]: Created slice system-modprobe.slice. May 10 00:44:14.307463 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 00:44:14.307488 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 00:44:14.307512 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 00:44:14.307536 systemd[1]: Created slice user.slice. May 10 00:44:14.307565 systemd[1]: Started systemd-ask-password-console.path. May 10 00:44:14.307589 systemd[1]: Started systemd-ask-password-wall.path. May 10 00:44:14.307612 systemd[1]: Set up automount boot.automount. May 10 00:44:14.307636 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 00:44:14.307660 systemd[1]: Stopped target initrd-switch-root.target. May 10 00:44:14.307784 systemd[1]: Stopped target initrd-fs.target. May 10 00:44:14.307813 systemd[1]: Stopped target initrd-root-fs.target. May 10 00:44:14.307839 systemd[1]: Reached target integritysetup.target. May 10 00:44:14.307863 systemd[1]: Reached target remote-cryptsetup.target. May 10 00:44:14.307891 systemd[1]: Reached target remote-fs.target. May 10 00:44:14.307916 systemd[1]: Reached target slices.target. May 10 00:44:14.307940 systemd[1]: Reached target swap.target. May 10 00:44:14.307967 systemd[1]: Reached target torcx.target. May 10 00:44:14.307992 systemd[1]: Reached target veritysetup.target. May 10 00:44:14.308013 systemd[1]: Listening on systemd-coredump.socket. May 10 00:44:14.308037 systemd[1]: Listening on systemd-initctl.socket. May 10 00:44:14.308059 systemd[1]: Listening on systemd-networkd.socket. May 10 00:44:14.308083 systemd[1]: Listening on systemd-udevd-control.socket. May 10 00:44:14.308106 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 00:44:14.308134 systemd[1]: Listening on systemd-userdbd.socket. May 10 00:44:14.308157 systemd[1]: Mounting dev-hugepages.mount... May 10 00:44:14.308186 systemd[1]: Mounting dev-mqueue.mount... May 10 00:44:14.308217 systemd[1]: Mounting media.mount... May 10 00:44:14.308242 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:14.308264 systemd[1]: Mounting sys-kernel-debug.mount... May 10 00:44:14.308298 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 00:44:14.308321 systemd[1]: Mounting tmp.mount... May 10 00:44:14.308344 systemd[1]: Starting flatcar-tmpfiles.service... May 10 00:44:14.308372 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:14.308415 systemd[1]: Starting kmod-static-nodes.service... May 10 00:44:14.308442 systemd[1]: Starting modprobe@configfs.service... May 10 00:44:14.308464 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:14.308487 systemd[1]: Starting modprobe@drm.service... May 10 00:44:14.308510 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:14.308534 systemd[1]: Starting modprobe@fuse.service... May 10 00:44:14.308558 systemd[1]: Starting modprobe@loop.service... May 10 00:44:14.308590 kernel: fuse: init (API version 7.34) May 10 00:44:14.308623 kernel: loop: module loaded May 10 00:44:14.308647 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 00:44:14.308672 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 00:44:14.308696 systemd[1]: Stopped systemd-fsck-root.service. May 10 00:44:14.308719 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 00:44:14.308743 systemd[1]: Stopped systemd-fsck-usr.service. May 10 00:44:14.308767 systemd[1]: Stopped systemd-journald.service. May 10 00:44:14.308792 systemd[1]: Starting systemd-journald.service... May 10 00:44:14.308815 systemd[1]: Starting systemd-modules-load.service... May 10 00:44:14.308843 systemd[1]: Starting systemd-network-generator.service... May 10 00:44:14.308870 systemd-journald[993]: Journal started May 10 00:44:14.308961 systemd-journald[993]: Runtime Journal (/run/log/journal/bef8cb21a2aece58f221265fb484aa30) is 8.0M, max 148.8M, 140.8M free. May 10 00:44:09.457000 audit: BPF prog-id=9 op=UNLOAD May 10 00:44:09.852000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 00:44:10.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:44:10.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 00:44:10.008000 audit: BPF prog-id=10 op=LOAD May 10 00:44:10.008000 audit: BPF prog-id=10 op=UNLOAD May 10 00:44:10.008000 audit: BPF prog-id=11 op=LOAD May 10 00:44:10.008000 audit: BPF prog-id=11 op=UNLOAD May 10 00:44:10.178000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 00:44:10.178000 audit[902]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178d2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:10.178000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:44:10.189000 audit[902]: AVC avc: denied { associate } for pid=902 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 00:44:10.189000 audit[902]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001179a9 a2=1ed a3=0 items=2 ppid=885 pid=902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:10.189000 audit: CWD cwd="/" May 10 00:44:10.189000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:10.189000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:10.189000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 00:44:13.368000 audit: BPF prog-id=12 op=LOAD May 10 00:44:13.368000 audit: BPF prog-id=3 op=UNLOAD May 10 00:44:13.380000 audit: BPF prog-id=13 op=LOAD May 10 00:44:13.394000 audit: BPF prog-id=14 op=LOAD May 10 00:44:13.394000 audit: BPF prog-id=4 op=UNLOAD May 10 00:44:13.394000 audit: BPF prog-id=5 op=UNLOAD May 10 00:44:13.401000 audit: BPF prog-id=15 op=LOAD May 10 00:44:13.401000 audit: BPF prog-id=12 op=UNLOAD May 10 00:44:13.408000 audit: BPF prog-id=16 op=LOAD May 10 00:44:13.415000 audit: BPF prog-id=17 op=LOAD May 10 00:44:13.415000 audit: BPF prog-id=13 op=UNLOAD May 10 00:44:13.415000 audit: BPF prog-id=14 op=UNLOAD May 10 00:44:13.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:13.450000 audit: BPF prog-id=15 op=UNLOAD May 10 00:44:13.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:13.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:13.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:13.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.259000 audit: BPF prog-id=18 op=LOAD May 10 00:44:14.259000 audit: BPF prog-id=19 op=LOAD May 10 00:44:14.259000 audit: BPF prog-id=20 op=LOAD May 10 00:44:14.259000 audit: BPF prog-id=16 op=UNLOAD May 10 00:44:14.259000 audit: BPF prog-id=17 op=UNLOAD May 10 00:44:14.301000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 00:44:14.301000 audit[993]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffea2917f80 a2=4000 a3=7ffea291801c items=0 ppid=1 pid=993 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:14.301000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 00:44:13.367453 systemd[1]: Queued start job for default target multi-user.target. May 10 00:44:10.172347 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:13.367469 systemd[1]: Unnecessary job was removed for dev-sda6.device. May 10 00:44:10.173642 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:44:13.418703 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 00:44:10.173679 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:44:10.173733 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 00:44:10.173753 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 00:44:10.173814 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 00:44:10.173839 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 00:44:10.174158 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 00:44:10.174223 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 00:44:10.174248 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 00:44:10.177079 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 00:44:10.177133 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 00:44:10.177158 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 00:44:10.177177 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 00:44:10.177201 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 00:44:10.177219 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:10Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 00:44:12.716986 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:12Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:12.717270 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:12Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:12.717428 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:12Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:12.717685 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:12Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 00:44:12.717758 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:12Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 00:44:12.717831 /usr/lib/systemd/system-generators/torcx-generator[902]: time="2025-05-10T00:44:12Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 00:44:14.318456 systemd[1]: Starting systemd-remount-fs.service... May 10 00:44:14.334821 systemd[1]: Starting systemd-udev-trigger.service... May 10 00:44:14.354039 systemd[1]: verity-setup.service: Deactivated successfully. May 10 00:44:14.354290 systemd[1]: Stopped verity-setup.service. May 10 00:44:14.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.375463 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:14.384433 systemd[1]: Started systemd-journald.service. May 10 00:44:14.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.393912 systemd[1]: Mounted dev-hugepages.mount. May 10 00:44:14.401777 systemd[1]: Mounted dev-mqueue.mount. May 10 00:44:14.408766 systemd[1]: Mounted media.mount. May 10 00:44:14.415731 systemd[1]: Mounted sys-kernel-debug.mount. May 10 00:44:14.425749 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 00:44:14.434748 systemd[1]: Mounted tmp.mount. May 10 00:44:14.441892 systemd[1]: Finished flatcar-tmpfiles.service. May 10 00:44:14.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.451012 systemd[1]: Finished kmod-static-nodes.service. May 10 00:44:14.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.459982 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 00:44:14.460218 systemd[1]: Finished modprobe@configfs.service. May 10 00:44:14.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.469045 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:14.469265 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:14.477000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.479010 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:44:14.479229 systemd[1]: Finished modprobe@drm.service. May 10 00:44:14.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.488015 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:14.488237 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:14.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.497040 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 00:44:14.497259 systemd[1]: Finished modprobe@fuse.service. May 10 00:44:14.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.505994 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:14.506213 systemd[1]: Finished modprobe@loop.service. May 10 00:44:14.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.515064 systemd[1]: Finished systemd-modules-load.service. May 10 00:44:14.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.524019 systemd[1]: Finished systemd-network-generator.service. May 10 00:44:14.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.533051 systemd[1]: Finished systemd-remount-fs.service. May 10 00:44:14.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.543024 systemd[1]: Finished systemd-udev-trigger.service. May 10 00:44:14.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.552450 systemd[1]: Reached target network-pre.target. May 10 00:44:14.564139 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 00:44:14.574044 systemd[1]: Mounting sys-kernel-config.mount... May 10 00:44:14.582594 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 00:44:14.585999 systemd[1]: Starting systemd-hwdb-update.service... May 10 00:44:14.595518 systemd[1]: Starting systemd-journal-flush.service... May 10 00:44:14.603593 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:14.605702 systemd[1]: Starting systemd-random-seed.service... May 10 00:44:14.612619 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:14.614610 systemd[1]: Starting systemd-sysctl.service... May 10 00:44:14.619756 systemd-journald[993]: Time spent on flushing to /var/log/journal/bef8cb21a2aece58f221265fb484aa30 is 63.780ms for 1153 entries. May 10 00:44:14.619756 systemd-journald[993]: System Journal (/var/log/journal/bef8cb21a2aece58f221265fb484aa30) is 8.0M, max 584.8M, 576.8M free. May 10 00:44:14.730517 systemd-journald[993]: Received client request to flush runtime journal. May 10 00:44:14.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.697000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:14.629830 systemd[1]: Starting systemd-sysusers.service... May 10 00:44:14.639280 systemd[1]: Starting systemd-udev-settle.service... May 10 00:44:14.733138 udevadm[1007]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. May 10 00:44:14.650004 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 00:44:14.659727 systemd[1]: Mounted sys-kernel-config.mount. May 10 00:44:14.668931 systemd[1]: Finished systemd-random-seed.service. May 10 00:44:14.681216 systemd[1]: Reached target first-boot-complete.target. May 10 00:44:14.690205 systemd[1]: Finished systemd-sysctl.service. May 10 00:44:14.707346 systemd[1]: Finished systemd-sysusers.service. May 10 00:44:14.731939 systemd[1]: Finished systemd-journal-flush.service. May 10 00:44:14.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.296063 systemd[1]: Finished systemd-hwdb-update.service. May 10 00:44:15.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.304000 audit: BPF prog-id=21 op=LOAD May 10 00:44:15.304000 audit: BPF prog-id=22 op=LOAD May 10 00:44:15.304000 audit: BPF prog-id=7 op=UNLOAD May 10 00:44:15.304000 audit: BPF prog-id=8 op=UNLOAD May 10 00:44:15.306516 systemd[1]: Starting systemd-udevd.service... May 10 00:44:15.330166 systemd-udevd[1010]: Using default interface naming scheme 'v252'. May 10 00:44:15.385868 systemd[1]: Started systemd-udevd.service. May 10 00:44:15.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.396000 audit: BPF prog-id=23 op=LOAD May 10 00:44:15.399138 systemd[1]: Starting systemd-networkd.service... May 10 00:44:15.413000 audit: BPF prog-id=24 op=LOAD May 10 00:44:15.413000 audit: BPF prog-id=25 op=LOAD May 10 00:44:15.413000 audit: BPF prog-id=26 op=LOAD May 10 00:44:15.416204 systemd[1]: Starting systemd-userdbd.service... May 10 00:44:15.467067 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 00:44:15.491529 systemd[1]: Started systemd-userdbd.service. May 10 00:44:15.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.572444 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 00:44:15.643438 kernel: ACPI: button: Power Button [PWRF] May 10 00:44:15.654097 systemd-networkd[1024]: lo: Link UP May 10 00:44:15.654114 systemd-networkd[1024]: lo: Gained carrier May 10 00:44:15.655512 systemd-networkd[1024]: Enumeration completed May 10 00:44:15.655802 systemd[1]: Started systemd-networkd.service. May 10 00:44:15.657526 systemd-networkd[1024]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 00:44:15.660279 systemd-networkd[1024]: eth0: Link UP May 10 00:44:15.660523 systemd-networkd[1024]: eth0: Gained carrier May 10 00:44:15.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.668615 systemd-networkd[1024]: eth0: Overlong DHCP hostname received, shortened from 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb.c.flatcar-212911.internal' to 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:44:15.668641 systemd-networkd[1024]: eth0: DHCPv4 address 10.128.0.17/32, gateway 10.128.0.1 acquired from 169.254.169.254 May 10 00:44:15.713428 kernel: input: Sleep Button as /devices/LNXSYSTM:00/LNXSLPBN:00/input/input3 May 10 00:44:15.671000 audit[1013]: AVC avc: denied { confidentiality } for pid=1013 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 00:44:15.671000 audit[1013]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=556e1bb2e530 a1=338ac a2=7f30ecd86bc5 a3=5 items=110 ppid=1010 pid=1013 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:15.671000 audit: CWD cwd="/" May 10 00:44:15.671000 audit: PATH item=0 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=1 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=2 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=3 name=(null) inode=13741 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=4 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=5 name=(null) inode=13742 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=6 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=7 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=8 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=9 name=(null) inode=13744 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=10 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=11 name=(null) inode=13745 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=12 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=13 name=(null) inode=13746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=14 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=15 name=(null) inode=13747 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=16 name=(null) inode=13743 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=17 name=(null) inode=13748 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=18 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=19 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=20 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=21 name=(null) inode=13750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=22 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=23 name=(null) inode=13751 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=24 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=25 name=(null) inode=13752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=26 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=27 name=(null) inode=13753 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=28 name=(null) inode=13749 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=29 name=(null) inode=13754 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=30 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=31 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=32 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=33 name=(null) inode=13756 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=34 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=35 name=(null) inode=13757 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=36 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=37 name=(null) inode=13758 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=38 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=39 name=(null) inode=13759 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=40 name=(null) inode=13755 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=41 name=(null) inode=13760 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=42 name=(null) inode=13740 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=43 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=44 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=45 name=(null) inode=13762 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=46 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=47 name=(null) inode=13763 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=48 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=49 name=(null) inode=13764 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=50 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=51 name=(null) inode=13765 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=52 name=(null) inode=13761 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=53 name=(null) inode=13768 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=54 name=(null) inode=40 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=55 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=56 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=57 name=(null) inode=13770 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=58 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=59 name=(null) inode=13771 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=60 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=61 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=62 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=63 name=(null) inode=13773 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=64 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=65 name=(null) inode=13774 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=66 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=67 name=(null) inode=13775 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=68 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=69 name=(null) inode=13776 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=70 name=(null) inode=13772 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=71 name=(null) inode=13777 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=72 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=73 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=74 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=75 name=(null) inode=13779 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=76 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=77 name=(null) inode=13780 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=78 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=79 name=(null) inode=13781 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=80 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=81 name=(null) inode=13782 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=82 name=(null) inode=13778 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=83 name=(null) inode=13783 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=84 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=85 name=(null) inode=13784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=86 name=(null) inode=13784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=87 name=(null) inode=13785 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=88 name=(null) inode=13784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=89 name=(null) inode=13786 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=90 name=(null) inode=13784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=91 name=(null) inode=13787 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=92 name=(null) inode=13784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=93 name=(null) inode=13788 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=94 name=(null) inode=13784 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.743438 kernel: EDAC MC: Ver: 3.0.0 May 10 00:44:15.671000 audit: PATH item=95 name=(null) inode=13789 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=96 name=(null) inode=13769 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=97 name=(null) inode=13790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=98 name=(null) inode=13790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=99 name=(null) inode=13791 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=100 name=(null) inode=13790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=101 name=(null) inode=13792 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=102 name=(null) inode=13790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=103 name=(null) inode=13793 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=104 name=(null) inode=13790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=105 name=(null) inode=13794 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=106 name=(null) inode=13790 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=107 name=(null) inode=13795 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PATH item=109 name=(null) inode=13796 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:44:15.671000 audit: PROCTITLE proctitle="(udev-worker)" May 10 00:44:15.750415 kernel: ACPI: button: Sleep Button [SLPF] May 10 00:44:15.770415 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input4 May 10 00:44:15.782242 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 00:44:15.811627 kernel: piix4_smbus 0000:00:01.3: SMBus base address uninitialized - upgrade BIOS or use force_addr=0xaddr May 10 00:44:15.812064 kernel: mousedev: PS/2 mouse device common for all mice May 10 00:44:15.827932 systemd[1]: Finished systemd-udev-settle.service. May 10 00:44:15.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.838289 systemd[1]: Starting lvm2-activation-early.service... May 10 00:44:15.869017 lvm[1047]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:44:15.900849 systemd[1]: Finished lvm2-activation-early.service. May 10 00:44:15.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.909815 systemd[1]: Reached target cryptsetup.target. May 10 00:44:15.920096 systemd[1]: Starting lvm2-activation.service... May 10 00:44:15.926597 lvm[1048]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 00:44:15.954975 systemd[1]: Finished lvm2-activation.service. May 10 00:44:15.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:15.964902 systemd[1]: Reached target local-fs-pre.target. May 10 00:44:15.973581 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 00:44:15.973636 systemd[1]: Reached target local-fs.target. May 10 00:44:15.982574 systemd[1]: Reached target machines.target. May 10 00:44:15.992181 systemd[1]: Starting ldconfig.service... May 10 00:44:16.000678 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:16.000780 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:16.002657 systemd[1]: Starting systemd-boot-update.service... May 10 00:44:16.011607 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 00:44:16.023242 systemd[1]: Starting systemd-machine-id-commit.service... May 10 00:44:16.025204 systemd[1]: Starting systemd-sysext.service... May 10 00:44:16.026255 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1050 (bootctl) May 10 00:44:16.028471 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 00:44:16.053715 systemd[1]: Unmounting usr-share-oem.mount... May 10 00:44:16.056000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.058068 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 00:44:16.064723 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 00:44:16.064993 systemd[1]: Unmounted usr-share-oem.mount. May 10 00:44:16.089496 kernel: loop0: detected capacity change from 0 to 210664 May 10 00:44:16.205412 systemd-fsck[1060]: fsck.fat 4.2 (2021-01-31) May 10 00:44:16.205412 systemd-fsck[1060]: /dev/sda1: 790 files, 120688/258078 clusters May 10 00:44:16.209703 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 00:44:16.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.221810 systemd[1]: Mounting boot.mount... May 10 00:44:16.295747 systemd[1]: Mounted boot.mount. May 10 00:44:16.321102 systemd[1]: Finished systemd-boot-update.service. May 10 00:44:16.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.474929 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 00:44:16.475801 systemd[1]: Finished systemd-machine-id-commit.service. May 10 00:44:16.483000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.519420 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 00:44:16.562477 kernel: loop1: detected capacity change from 0 to 210664 May 10 00:44:16.588559 (sd-sysext)[1066]: Using extensions 'kubernetes'. May 10 00:44:16.589746 (sd-sysext)[1066]: Merged extensions into '/usr'. May 10 00:44:16.614925 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:16.618288 systemd[1]: Mounting usr-share-oem.mount... May 10 00:44:16.625834 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:16.627831 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:16.636599 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:16.646720 systemd[1]: Starting modprobe@loop.service... May 10 00:44:16.654681 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:16.654952 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:16.655178 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:16.656888 ldconfig[1049]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 00:44:16.660649 systemd[1]: Mounted usr-share-oem.mount. May 10 00:44:16.668224 systemd[1]: Finished ldconfig.service. May 10 00:44:16.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.676429 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:16.676681 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:16.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.686312 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:16.686564 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:16.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.694000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.696303 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:16.696563 systemd[1]: Finished modprobe@loop.service. May 10 00:44:16.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.705539 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:16.705750 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:16.707221 systemd[1]: Finished systemd-sysext.service. May 10 00:44:16.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:16.717313 systemd[1]: Starting ensure-sysext.service... May 10 00:44:16.725960 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 00:44:16.739326 systemd[1]: Reloading. May 10 00:44:16.762593 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 00:44:16.774633 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 00:44:16.788704 systemd-tmpfiles[1073]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 00:44:16.835079 /usr/lib/systemd/system-generators/torcx-generator[1093]: time="2025-05-10T00:44:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:16.848641 /usr/lib/systemd/system-generators/torcx-generator[1093]: time="2025-05-10T00:44:16Z" level=info msg="torcx already run" May 10 00:44:16.994431 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:16.994841 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:17.042654 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:17.132000 audit: BPF prog-id=27 op=LOAD May 10 00:44:17.132000 audit: BPF prog-id=18 op=UNLOAD May 10 00:44:17.132000 audit: BPF prog-id=28 op=LOAD May 10 00:44:17.132000 audit: BPF prog-id=29 op=LOAD May 10 00:44:17.132000 audit: BPF prog-id=19 op=UNLOAD May 10 00:44:17.132000 audit: BPF prog-id=20 op=UNLOAD May 10 00:44:17.133000 audit: BPF prog-id=30 op=LOAD May 10 00:44:17.133000 audit: BPF prog-id=24 op=UNLOAD May 10 00:44:17.133000 audit: BPF prog-id=31 op=LOAD May 10 00:44:17.133000 audit: BPF prog-id=32 op=LOAD May 10 00:44:17.133000 audit: BPF prog-id=25 op=UNLOAD May 10 00:44:17.133000 audit: BPF prog-id=26 op=UNLOAD May 10 00:44:17.134000 audit: BPF prog-id=33 op=LOAD May 10 00:44:17.134000 audit: BPF prog-id=23 op=UNLOAD May 10 00:44:17.135000 audit: BPF prog-id=34 op=LOAD May 10 00:44:17.135000 audit: BPF prog-id=35 op=LOAD May 10 00:44:17.135000 audit: BPF prog-id=21 op=UNLOAD May 10 00:44:17.135000 audit: BPF prog-id=22 op=UNLOAD May 10 00:44:17.145947 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 00:44:17.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.161156 systemd[1]: Starting audit-rules.service... May 10 00:44:17.171048 systemd[1]: Starting clean-ca-certificates.service... May 10 00:44:17.180924 systemd[1]: Starting oem-gce-enable-oslogin.service... May 10 00:44:17.191990 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 00:44:17.201000 audit: BPF prog-id=36 op=LOAD May 10 00:44:17.204907 systemd[1]: Starting systemd-resolved.service... May 10 00:44:17.211000 audit: BPF prog-id=37 op=LOAD May 10 00:44:17.214806 systemd[1]: Starting systemd-timesyncd.service... May 10 00:44:17.223778 systemd[1]: Starting systemd-update-utmp.service... May 10 00:44:17.232424 systemd[1]: Finished clean-ca-certificates.service. May 10 00:44:17.234000 audit[1163]: SYSTEM_BOOT pid=1163 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 00:44:17.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.242374 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 10 00:44:17.242662 systemd[1]: Finished oem-gce-enable-oslogin.service. May 10 00:44:17.252475 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 00:44:17.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.250000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=oem-gce-enable-oslogin comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:17.254000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 00:44:17.254000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc8ccf1980 a2=420 a3=0 items=0 ppid=1137 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:17.256288 augenrules[1167]: No rules May 10 00:44:17.254000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 00:44:17.264284 systemd[1]: Finished audit-rules.service. May 10 00:44:17.277114 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:17.277806 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:17.280463 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:17.286574 systemd-networkd[1024]: eth0: Gained IPv6LL May 10 00:44:17.289846 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:17.298901 systemd[1]: Starting modprobe@loop.service... May 10 00:44:17.307783 systemd[1]: Starting oem-gce-enable-oslogin.service... May 10 00:44:17.316629 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:17.317002 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:17.319787 systemd[1]: Starting systemd-update-done.service... May 10 00:44:17.325815 enable-oslogin[1175]: /etc/pam.d/sshd already exists. Not enabling OS Login May 10 00:44:17.326530 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:17.326866 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:17.330738 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:17.330998 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:17.340527 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:17.340741 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:17.350510 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:17.350729 systemd[1]: Finished modprobe@loop.service. May 10 00:44:17.360463 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 10 00:44:17.360723 systemd[1]: Finished oem-gce-enable-oslogin.service. May 10 00:44:17.370659 systemd[1]: Finished systemd-update-done.service. May 10 00:44:17.380607 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:17.380892 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:17.385203 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:17.385853 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 00:44:17.392585 systemd[1]: Starting modprobe@dm_mod.service... May 10 00:44:17.839204 systemd-timesyncd[1158]: Contacted time server 169.254.169.254:123 (169.254.169.254). May 10 00:44:17.839707 systemd-timesyncd[1158]: Initial clock synchronization to Sat 2025-05-10 00:44:17.839077 UTC. May 10 00:44:17.844252 systemd[1]: Starting modprobe@efi_pstore.service... May 10 00:44:17.853662 systemd[1]: Starting modprobe@loop.service... May 10 00:44:17.862104 systemd[1]: Starting oem-gce-enable-oslogin.service... May 10 00:44:17.862535 systemd-resolved[1153]: Positive Trust Anchors: May 10 00:44:17.862555 systemd-resolved[1153]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 00:44:17.862613 systemd-resolved[1153]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 00:44:17.867820 enable-oslogin[1181]: /etc/pam.d/sshd already exists. Not enabling OS Login May 10 00:44:17.870743 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 00:44:17.871025 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:17.871278 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 00:44:17.871445 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 00:44:17.873351 systemd[1]: Started systemd-timesyncd.service. May 10 00:44:17.883126 systemd[1]: Finished systemd-update-utmp.service. May 10 00:44:17.892159 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 00:44:17.892406 systemd[1]: Finished modprobe@dm_mod.service. May 10 00:44:17.898458 systemd-resolved[1153]: Defaulting to hostname 'linux'. May 10 00:44:17.900934 systemd[1]: Started systemd-resolved.service. May 10 00:44:17.910045 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 00:44:17.910284 systemd[1]: Finished modprobe@efi_pstore.service. May 10 00:44:17.919048 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 00:44:17.919318 systemd[1]: Finished modprobe@loop.service. May 10 00:44:17.928158 systemd[1]: oem-gce-enable-oslogin.service: Deactivated successfully. May 10 00:44:17.928434 systemd[1]: Finished oem-gce-enable-oslogin.service. May 10 00:44:17.939299 systemd[1]: Reached target network.target. May 10 00:44:17.947733 systemd[1]: Reached target nss-lookup.target. May 10 00:44:17.956580 systemd[1]: Reached target time-set.target. May 10 00:44:17.965569 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 00:44:17.965824 systemd[1]: Reached target sysinit.target. May 10 00:44:17.974824 systemd[1]: Started motdgen.path. May 10 00:44:17.982719 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 00:44:17.992933 systemd[1]: Started logrotate.timer. May 10 00:44:18.000804 systemd[1]: Started mdadm.timer. May 10 00:44:18.008673 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 00:44:18.017556 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:44:18.017760 systemd[1]: Reached target paths.target. May 10 00:44:18.025624 systemd[1]: Reached target timers.target. May 10 00:44:18.033327 systemd[1]: Listening on dbus.socket. May 10 00:44:18.042626 systemd[1]: Starting docker.socket... May 10 00:44:18.053949 systemd[1]: Listening on sshd.socket. May 10 00:44:18.061721 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:18.062023 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 00:44:18.065019 systemd[1]: Listening on docker.socket. May 10 00:44:18.075128 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 00:44:18.075339 systemd[1]: Reached target sockets.target. May 10 00:44:18.083612 systemd[1]: Reached target basic.target. May 10 00:44:18.090567 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:44:18.090779 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 00:44:18.092896 systemd[1]: Starting containerd.service... May 10 00:44:18.103052 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 00:44:18.114620 systemd[1]: Starting dbus.service... May 10 00:44:18.123463 systemd[1]: Starting enable-oem-cloudinit.service... May 10 00:44:18.133519 systemd[1]: Starting extend-filesystems.service... May 10 00:44:18.147371 jq[1187]: false May 10 00:44:18.140403 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 00:44:18.142964 systemd[1]: Starting modprobe@drm.service... May 10 00:44:18.152578 systemd[1]: Starting motdgen.service... May 10 00:44:18.163070 systemd[1]: Starting prepare-helm.service... May 10 00:44:18.172512 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 00:44:18.181657 systemd[1]: Starting sshd-keygen.service... May 10 00:44:18.190562 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 00:44:18.199399 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 00:44:18.199709 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionSecurity=!tpm2). May 10 00:44:18.200586 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 00:44:18.202206 systemd[1]: Starting update-engine.service... May 10 00:44:18.213443 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 00:44:18.226685 jq[1204]: true May 10 00:44:18.228511 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 00:44:18.229110 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 00:44:18.230118 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 00:44:18.232448 systemd[1]: Finished modprobe@drm.service. May 10 00:44:18.244048 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 00:44:18.244378 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 00:44:18.254357 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 00:44:18.264155 extend-filesystems[1188]: Found loop1 May 10 00:44:18.271426 extend-filesystems[1188]: Found sda May 10 00:44:18.274559 systemd[1]: motdgen.service: Deactivated successfully. May 10 00:44:18.281994 extend-filesystems[1188]: Found sda1 May 10 00:44:18.281994 extend-filesystems[1188]: Found sda2 May 10 00:44:18.281994 extend-filesystems[1188]: Found sda3 May 10 00:44:18.281994 extend-filesystems[1188]: Found usr May 10 00:44:18.281994 extend-filesystems[1188]: Found sda4 May 10 00:44:18.281994 extend-filesystems[1188]: Found sda6 May 10 00:44:18.281994 extend-filesystems[1188]: Found sda7 May 10 00:44:18.281994 extend-filesystems[1188]: Found sda9 May 10 00:44:18.281994 extend-filesystems[1188]: Checking size of /dev/sda9 May 10 00:44:18.511497 kernel: EXT4-fs (sda9): resizing filesystem from 1617920 to 2538491 blocks May 10 00:44:18.511567 kernel: EXT4-fs (sda9): resized filesystem to 2538491 May 10 00:44:18.274864 systemd[1]: Finished motdgen.service. May 10 00:44:18.512175 extend-filesystems[1188]: Resized partition /dev/sda9 May 10 00:44:18.518861 update_engine[1202]: I0510 00:44:18.417433 1202 main.cc:92] Flatcar Update Engine starting May 10 00:44:18.518861 update_engine[1202]: I0510 00:44:18.431485 1202 update_check_scheduler.cc:74] Next update check in 8m10s May 10 00:44:18.315968 dbus-daemon[1186]: [system] SELinux support is enabled May 10 00:44:18.519584 tar[1211]: linux-amd64/helm May 10 00:44:18.519971 jq[1214]: true May 10 00:44:18.293056 systemd[1]: Finished ensure-sysext.service. May 10 00:44:18.520517 extend-filesystems[1226]: resize2fs 1.46.5 (30-Dec-2021) May 10 00:44:18.520517 extend-filesystems[1226]: Filesystem at /dev/sda9 is mounted on /; on-line resizing required May 10 00:44:18.520517 extend-filesystems[1226]: old_desc_blocks = 1, new_desc_blocks = 2 May 10 00:44:18.520517 extend-filesystems[1226]: The filesystem on /dev/sda9 is now 2538491 (4k) blocks long. May 10 00:44:18.571470 kernel: loop2: detected capacity change from 0 to 2097152 May 10 00:44:18.325237 dbus-daemon[1186]: [system] Activating systemd to hand-off: service name='org.freedesktop.hostname1' unit='dbus-org.freedesktop.hostname1.service' requested by ':1.2' (uid=244 pid=1024 comm="/usr/lib/systemd/systemd-networkd" label="system_u:system_r:kernel_t:s0") May 10 00:44:18.301652 systemd[1]: Reached target network-online.target. May 10 00:44:18.571995 env[1215]: time="2025-05-10T00:44:18.555356748Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 00:44:18.572405 extend-filesystems[1188]: Resized filesystem in /dev/sda9 May 10 00:44:18.380226 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.systemd1' May 10 00:44:18.312914 systemd[1]: Starting kubelet.service... May 10 00:44:18.331765 systemd[1]: Starting oem-gce.service... May 10 00:44:18.343637 systemd[1]: Starting systemd-logind.service... May 10 00:44:18.583634 bash[1254]: Updated "/home/core/.ssh/authorized_keys" May 10 00:44:18.350729 systemd[1]: Started dbus.service. May 10 00:44:18.372192 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 00:44:18.584385 mkfs.ext4[1236]: mke2fs 1.46.5 (30-Dec-2021) May 10 00:44:18.584385 mkfs.ext4[1236]: Discarding device blocks: 0/262144\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008 \u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008\u0008done May 10 00:44:18.584385 mkfs.ext4[1236]: Creating filesystem with 262144 4k blocks and 65536 inodes May 10 00:44:18.584385 mkfs.ext4[1236]: Filesystem UUID: 66924138-fafe-4a01-8a5c-e798c411bc2f May 10 00:44:18.584385 mkfs.ext4[1236]: Superblock backups stored on blocks: May 10 00:44:18.584385 mkfs.ext4[1236]: 32768, 98304, 163840, 229376 May 10 00:44:18.584385 mkfs.ext4[1236]: Allocating group tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 10 00:44:18.584385 mkfs.ext4[1236]: Writing inode tables: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 10 00:44:18.584385 mkfs.ext4[1236]: Creating journal (8192 blocks): done May 10 00:44:18.584385 mkfs.ext4[1236]: Writing superblocks and filesystem accounting information: 0/8\u0008\u0008\u0008 \u0008\u0008\u0008done May 10 00:44:18.372285 systemd[1]: Reached target system-config.target. May 10 00:44:18.403142 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 00:44:18.403181 systemd[1]: Reached target user-config.target. May 10 00:44:18.436291 systemd[1]: Starting systemd-hostnamed.service... May 10 00:44:18.443624 systemd[1]: Started update-engine.service. May 10 00:44:18.586079 umount[1251]: umount: /var/lib/flatcar-oem-gce.img: not mounted. May 10 00:44:18.460252 systemd[1]: Started locksmithd.service. May 10 00:44:18.472074 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 00:44:18.472404 systemd[1]: Finished extend-filesystems.service. May 10 00:44:18.578603 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 00:44:18.628245 kernel: EXT4-fs (loop2): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 00:44:18.747266 coreos-metadata[1185]: May 10 00:44:18.747 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/sshKeys: Attempt #1 May 10 00:44:18.751940 env[1215]: time="2025-05-10T00:44:18.751875334Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 00:44:18.759478 env[1215]: time="2025-05-10T00:44:18.759427608Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:18.762965 env[1215]: time="2025-05-10T00:44:18.762841319Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:18.764288 env[1215]: time="2025-05-10T00:44:18.764246671Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:18.764823 env[1215]: time="2025-05-10T00:44:18.764782575Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:18.767727 coreos-metadata[1185]: May 10 00:44:18.767 INFO Fetch failed with 404: resource not found May 10 00:44:18.768040 coreos-metadata[1185]: May 10 00:44:18.767 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/ssh-keys: Attempt #1 May 10 00:44:18.771334 env[1215]: time="2025-05-10T00:44:18.771285565Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 00:44:18.771521 env[1215]: time="2025-05-10T00:44:18.771492106Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 00:44:18.771615 env[1215]: time="2025-05-10T00:44:18.771595909Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 00:44:18.771852 env[1215]: time="2025-05-10T00:44:18.771823359Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:18.773328 coreos-metadata[1185]: May 10 00:44:18.773 INFO Fetch successful May 10 00:44:18.773577 coreos-metadata[1185]: May 10 00:44:18.773 INFO Fetching http://169.254.169.254/computeMetadata/v1/instance/attributes/block-project-ssh-keys: Attempt #1 May 10 00:44:18.777161 env[1215]: time="2025-05-10T00:44:18.777122024Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 00:44:18.779500 coreos-metadata[1185]: May 10 00:44:18.779 INFO Fetch failed with 404: resource not found May 10 00:44:18.779723 coreos-metadata[1185]: May 10 00:44:18.779 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/sshKeys: Attempt #1 May 10 00:44:18.780178 env[1215]: time="2025-05-10T00:44:18.780132499Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 00:44:18.781477 coreos-metadata[1185]: May 10 00:44:18.781 INFO Fetch failed with 404: resource not found May 10 00:44:18.781695 coreos-metadata[1185]: May 10 00:44:18.781 INFO Fetching http://169.254.169.254/computeMetadata/v1/project/attributes/ssh-keys: Attempt #1 May 10 00:44:18.785350 env[1215]: time="2025-05-10T00:44:18.785301827Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 00:44:18.785593 env[1215]: time="2025-05-10T00:44:18.785565621Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 00:44:18.787419 env[1215]: time="2025-05-10T00:44:18.787385628Z" level=info msg="metadata content store policy set" policy=shared May 10 00:44:18.788252 coreos-metadata[1185]: May 10 00:44:18.788 INFO Fetch successful May 10 00:44:18.804700 unknown[1185]: wrote ssh authorized keys file for user: core May 10 00:44:18.822780 env[1215]: time="2025-05-10T00:44:18.822711152Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 00:44:18.823037 env[1215]: time="2025-05-10T00:44:18.822995704Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 00:44:18.823209 env[1215]: time="2025-05-10T00:44:18.823182415Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 00:44:18.823515 env[1215]: time="2025-05-10T00:44:18.823381995Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 00:44:18.823679 env[1215]: time="2025-05-10T00:44:18.823652272Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 00:44:18.823828 env[1215]: time="2025-05-10T00:44:18.823802047Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 00:44:18.823990 env[1215]: time="2025-05-10T00:44:18.823959155Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 00:44:18.824156 env[1215]: time="2025-05-10T00:44:18.824133016Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 00:44:18.824304 env[1215]: time="2025-05-10T00:44:18.824282159Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 00:44:18.824440 env[1215]: time="2025-05-10T00:44:18.824420470Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 00:44:18.824555 env[1215]: time="2025-05-10T00:44:18.824535865Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 00:44:18.824675 env[1215]: time="2025-05-10T00:44:18.824655019Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 00:44:18.824971 env[1215]: time="2025-05-10T00:44:18.824949693Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 00:44:18.825254 env[1215]: time="2025-05-10T00:44:18.825232739Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 00:44:18.825922 env[1215]: time="2025-05-10T00:44:18.825896774Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 00:44:18.826119 env[1215]: time="2025-05-10T00:44:18.826087838Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 00:44:18.826277 env[1215]: time="2025-05-10T00:44:18.826255375Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 00:44:18.826460 env[1215]: time="2025-05-10T00:44:18.826440412Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 00:44:18.826638 env[1215]: time="2025-05-10T00:44:18.826617709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 00:44:18.826738 env[1215]: time="2025-05-10T00:44:18.826718425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 00:44:18.826859 env[1215]: time="2025-05-10T00:44:18.826840661Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 00:44:18.826964 env[1215]: time="2025-05-10T00:44:18.826944111Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 00:44:18.827083 env[1215]: time="2025-05-10T00:44:18.827062045Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 00:44:18.828537 systemd-logind[1227]: Watching system buttons on /dev/input/event1 (Power Button) May 10 00:44:18.829354 env[1215]: time="2025-05-10T00:44:18.829318968Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 00:44:18.832115 env[1215]: time="2025-05-10T00:44:18.832078906Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 00:44:18.832517 env[1215]: time="2025-05-10T00:44:18.832483448Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 00:44:18.832817 env[1215]: time="2025-05-10T00:44:18.832792286Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 00:44:18.832969 env[1215]: time="2025-05-10T00:44:18.832943197Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 00:44:18.833106 env[1215]: time="2025-05-10T00:44:18.833080298Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 00:44:18.833530 env[1215]: time="2025-05-10T00:44:18.833500920Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 00:44:18.833696 env[1215]: time="2025-05-10T00:44:18.833638435Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 00:44:18.833839 env[1215]: time="2025-05-10T00:44:18.833814718Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 00:44:18.833955 env[1215]: time="2025-05-10T00:44:18.833931270Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 00:44:18.834232 env[1215]: time="2025-05-10T00:44:18.834191125Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 00:44:18.834883 env[1215]: time="2025-05-10T00:44:18.834763999Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 00:44:18.837972 env[1215]: time="2025-05-10T00:44:18.836482607Z" level=info msg="Connect containerd service" May 10 00:44:18.838450 env[1215]: time="2025-05-10T00:44:18.838415144Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 00:44:18.850151 update-ssh-keys[1264]: Updated "/home/core/.ssh/authorized_keys" May 10 00:44:18.852516 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 00:44:18.856093 env[1215]: time="2025-05-10T00:44:18.856032636Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:44:18.856366 systemd-logind[1227]: Watching system buttons on /dev/input/event2 (Sleep Button) May 10 00:44:18.862710 systemd-logind[1227]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 00:44:18.863411 env[1215]: time="2025-05-10T00:44:18.863367346Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 00:44:18.869650 env[1215]: time="2025-05-10T00:44:18.869464606Z" level=info msg="Start subscribing containerd event" May 10 00:44:18.869966 systemd-logind[1227]: New seat seat0. May 10 00:44:18.874396 env[1215]: time="2025-05-10T00:44:18.874331368Z" level=info msg="Start recovering state" May 10 00:44:18.874778 env[1215]: time="2025-05-10T00:44:18.874749332Z" level=info msg="Start event monitor" May 10 00:44:18.875081 env[1215]: time="2025-05-10T00:44:18.875037866Z" level=info msg="Start snapshots syncer" May 10 00:44:18.875239 env[1215]: time="2025-05-10T00:44:18.875198179Z" level=info msg="Start cni network conf syncer for default" May 10 00:44:18.877357 env[1215]: time="2025-05-10T00:44:18.877319590Z" level=info msg="Start streaming server" May 10 00:44:18.877986 env[1215]: time="2025-05-10T00:44:18.877958890Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 00:44:18.878759 systemd[1]: Started containerd.service. May 10 00:44:18.879035 env[1215]: time="2025-05-10T00:44:18.879001485Z" level=info msg="containerd successfully booted in 0.330557s" May 10 00:44:18.886928 systemd[1]: Started systemd-logind.service. May 10 00:44:18.915446 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.hostname1' May 10 00:44:18.915668 systemd[1]: Started systemd-hostnamed.service. May 10 00:44:18.916825 dbus-daemon[1186]: [system] Activating via systemd: service name='org.freedesktop.PolicyKit1' unit='polkit.service' requested by ':1.6' (uid=0 pid=1241 comm="/usr/lib/systemd/systemd-hostnamed" label="system_u:system_r:kernel_t:s0") May 10 00:44:18.929487 systemd[1]: Starting polkit.service... May 10 00:44:19.064795 polkitd[1265]: Started polkitd version 121 May 10 00:44:19.112929 polkitd[1265]: Loading rules from directory /etc/polkit-1/rules.d May 10 00:44:19.113021 polkitd[1265]: Loading rules from directory /usr/share/polkit-1/rules.d May 10 00:44:19.115762 polkitd[1265]: Finished loading, compiling and executing 2 rules May 10 00:44:19.116438 dbus-daemon[1186]: [system] Successfully activated service 'org.freedesktop.PolicyKit1' May 10 00:44:19.116668 systemd[1]: Started polkit.service. May 10 00:44:19.117373 polkitd[1265]: Acquired the name org.freedesktop.PolicyKit1 on the system bus May 10 00:44:19.138957 systemd-hostnamed[1241]: Hostname set to (transient) May 10 00:44:19.142855 systemd-resolved[1153]: System hostname changed to 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb'. May 10 00:44:19.712983 tar[1211]: linux-amd64/LICENSE May 10 00:44:19.712983 tar[1211]: linux-amd64/README.md May 10 00:44:19.720507 systemd[1]: Finished prepare-helm.service. May 10 00:44:20.696390 systemd[1]: Started kubelet.service. May 10 00:44:21.181554 locksmithd[1242]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 00:44:22.275727 kubelet[1288]: E0510 00:44:22.275670 1288 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:22.278628 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:22.278878 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:22.279290 systemd[1]: kubelet.service: Consumed 1.511s CPU time. May 10 00:44:22.391354 sshd_keygen[1213]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 00:44:22.433762 systemd[1]: Finished sshd-keygen.service. May 10 00:44:22.444444 systemd[1]: Starting issuegen.service... May 10 00:44:22.457577 systemd[1]: issuegen.service: Deactivated successfully. May 10 00:44:22.457849 systemd[1]: Finished issuegen.service. May 10 00:44:22.467753 systemd[1]: Starting systemd-user-sessions.service... May 10 00:44:22.479964 systemd[1]: Finished systemd-user-sessions.service. May 10 00:44:22.490878 systemd[1]: Started getty@tty1.service. May 10 00:44:22.502450 systemd[1]: Started serial-getty@ttyS0.service. May 10 00:44:22.511811 systemd[1]: Reached target getty.target. May 10 00:44:24.509593 systemd[1]: var-lib-flatcar\x2doem\x2dgce.mount: Deactivated successfully. May 10 00:44:26.465971 systemd[1]: Created slice system-sshd.slice. May 10 00:44:26.476803 systemd[1]: Started sshd@0-10.128.0.17:22-147.75.109.163:54520.service. May 10 00:44:26.596454 kernel: loop2: detected capacity change from 0 to 2097152 May 10 00:44:26.616542 systemd-nspawn[1313]: Spawning container oem-gce on /var/lib/flatcar-oem-gce.img. May 10 00:44:26.616542 systemd-nspawn[1313]: Press ^] three times within 1s to kill container. May 10 00:44:26.632260 kernel: EXT4-fs (loop2): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 00:44:26.720864 systemd[1]: Started oem-gce.service. May 10 00:44:26.729873 systemd[1]: Reached target multi-user.target. May 10 00:44:26.740548 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 00:44:26.755518 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 00:44:26.755787 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 00:44:26.765623 systemd[1]: Startup finished in 1.058s (kernel) + 7.899s (initrd) + 16.604s (userspace) = 25.562s. May 10 00:44:26.786179 systemd-nspawn[1313]: + '[' -e /etc/default/instance_configs.cfg.template ']' May 10 00:44:26.786179 systemd-nspawn[1313]: + echo -e '[InstanceSetup]\nset_host_keys = false' May 10 00:44:26.786472 systemd-nspawn[1313]: + /usr/bin/google_instance_setup May 10 00:44:26.833973 sshd[1311]: Accepted publickey for core from 147.75.109.163 port 54520 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:44:26.840465 sshd[1311]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:26.861828 systemd[1]: Created slice user-500.slice. May 10 00:44:26.863683 systemd[1]: Starting user-runtime-dir@500.service... May 10 00:44:26.871298 systemd-logind[1227]: New session 1 of user core. May 10 00:44:26.879972 systemd[1]: Finished user-runtime-dir@500.service. May 10 00:44:26.882937 systemd[1]: Starting user@500.service... May 10 00:44:26.899616 (systemd)[1321]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:27.041349 systemd[1321]: Queued start job for default target default.target. May 10 00:44:27.042255 systemd[1321]: Reached target paths.target. May 10 00:44:27.042295 systemd[1321]: Reached target sockets.target. May 10 00:44:27.042317 systemd[1321]: Reached target timers.target. May 10 00:44:27.042337 systemd[1321]: Reached target basic.target. May 10 00:44:27.042504 systemd[1]: Started user@500.service. May 10 00:44:27.044066 systemd[1]: Started session-1.scope. May 10 00:44:27.044773 systemd[1321]: Reached target default.target. May 10 00:44:27.045031 systemd[1321]: Startup finished in 133ms. May 10 00:44:27.269481 systemd[1]: Started sshd@1-10.128.0.17:22-147.75.109.163:60970.service. May 10 00:44:27.564891 instance-setup[1319]: INFO Running google_set_multiqueue. May 10 00:44:27.565963 sshd[1330]: Accepted publickey for core from 147.75.109.163 port 60970 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:44:27.568515 sshd[1330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:27.576284 systemd-logind[1227]: New session 2 of user core. May 10 00:44:27.576627 systemd[1]: Started session-2.scope. May 10 00:44:27.591257 instance-setup[1319]: INFO Set channels for eth0 to 2. May 10 00:44:27.595050 instance-setup[1319]: INFO Setting /proc/irq/31/smp_affinity_list to 0 for device virtio1. May 10 00:44:27.596609 instance-setup[1319]: INFO /proc/irq/31/smp_affinity_list: real affinity 0 May 10 00:44:27.597070 instance-setup[1319]: INFO Setting /proc/irq/32/smp_affinity_list to 0 for device virtio1. May 10 00:44:27.598522 instance-setup[1319]: INFO /proc/irq/32/smp_affinity_list: real affinity 0 May 10 00:44:27.598979 instance-setup[1319]: INFO Setting /proc/irq/33/smp_affinity_list to 1 for device virtio1. May 10 00:44:27.600389 instance-setup[1319]: INFO /proc/irq/33/smp_affinity_list: real affinity 1 May 10 00:44:27.600842 instance-setup[1319]: INFO Setting /proc/irq/34/smp_affinity_list to 1 for device virtio1. May 10 00:44:27.602259 instance-setup[1319]: INFO /proc/irq/34/smp_affinity_list: real affinity 1 May 10 00:44:27.620454 instance-setup[1319]: INFO Queue 0 XPS=1 for /sys/class/net/eth0/queues/tx-0/xps_cpus May 10 00:44:27.620635 instance-setup[1319]: INFO Queue 1 XPS=2 for /sys/class/net/eth0/queues/tx-1/xps_cpus May 10 00:44:27.660932 systemd-nspawn[1313]: + /usr/bin/google_metadata_script_runner --script-type startup May 10 00:44:27.784780 sshd[1330]: pam_unix(sshd:session): session closed for user core May 10 00:44:27.789707 systemd[1]: sshd@1-10.128.0.17:22-147.75.109.163:60970.service: Deactivated successfully. May 10 00:44:27.791042 systemd[1]: session-2.scope: Deactivated successfully. May 10 00:44:27.792772 systemd-logind[1227]: Session 2 logged out. Waiting for processes to exit. May 10 00:44:27.794441 systemd-logind[1227]: Removed session 2. May 10 00:44:27.829578 systemd[1]: Started sshd@2-10.128.0.17:22-147.75.109.163:60972.service. May 10 00:44:28.021262 startup-script[1363]: INFO Starting startup scripts. May 10 00:44:28.037314 startup-script[1363]: INFO No startup scripts found in metadata. May 10 00:44:28.037503 startup-script[1363]: INFO Finished running startup scripts. May 10 00:44:28.075785 systemd-nspawn[1313]: + trap 'stopping=1 ; kill "${daemon_pids[@]}" || :' SIGTERM May 10 00:44:28.075785 systemd-nspawn[1313]: + daemon_pids=() May 10 00:44:28.075785 systemd-nspawn[1313]: + for d in accounts clock_skew network May 10 00:44:28.075785 systemd-nspawn[1313]: + daemon_pids+=($!) May 10 00:44:28.075785 systemd-nspawn[1313]: + for d in accounts clock_skew network May 10 00:44:28.075785 systemd-nspawn[1313]: + daemon_pids+=($!) May 10 00:44:28.075785 systemd-nspawn[1313]: + for d in accounts clock_skew network May 10 00:44:28.075785 systemd-nspawn[1313]: + daemon_pids+=($!) May 10 00:44:28.075785 systemd-nspawn[1313]: + NOTIFY_SOCKET=/run/systemd/notify May 10 00:44:28.075785 systemd-nspawn[1313]: + /usr/bin/systemd-notify --ready May 10 00:44:28.075785 systemd-nspawn[1313]: + /usr/bin/google_network_daemon May 10 00:44:28.076437 systemd-nspawn[1313]: + /usr/bin/google_clock_skew_daemon May 10 00:44:28.077006 systemd-nspawn[1313]: + /usr/bin/google_accounts_daemon May 10 00:44:28.134953 sshd[1367]: Accepted publickey for core from 147.75.109.163 port 60972 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:44:28.136590 sshd[1367]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:28.145356 systemd[1]: Started session-3.scope. May 10 00:44:28.147896 systemd-logind[1227]: New session 3 of user core. May 10 00:44:28.158004 systemd-nspawn[1313]: + wait -n 36 37 38 May 10 00:44:28.345234 sshd[1367]: pam_unix(sshd:session): session closed for user core May 10 00:44:28.350209 systemd[1]: sshd@2-10.128.0.17:22-147.75.109.163:60972.service: Deactivated successfully. May 10 00:44:28.351445 systemd[1]: session-3.scope: Deactivated successfully. May 10 00:44:28.352365 systemd-logind[1227]: Session 3 logged out. Waiting for processes to exit. May 10 00:44:28.353864 systemd-logind[1227]: Removed session 3. May 10 00:44:28.390049 systemd[1]: Started sshd@3-10.128.0.17:22-147.75.109.163:60978.service. May 10 00:44:28.699638 sshd[1379]: Accepted publickey for core from 147.75.109.163 port 60978 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:44:28.700387 sshd[1379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:28.708599 systemd[1]: Started session-4.scope. May 10 00:44:28.710299 systemd-logind[1227]: New session 4 of user core. May 10 00:44:28.735138 google-clock-skew[1372]: INFO Starting Google Clock Skew daemon. May 10 00:44:28.756248 google-clock-skew[1372]: INFO Clock drift token has changed: 0. May 10 00:44:28.768050 systemd-nspawn[1313]: hwclock: Cannot access the Hardware Clock via any known method. May 10 00:44:28.768782 systemd-nspawn[1313]: hwclock: Use the --verbose option to see the details of our search for an access method. May 10 00:44:28.769817 google-clock-skew[1372]: WARNING Failed to sync system time with hardware clock. May 10 00:44:28.857794 groupadd[1389]: group added to /etc/group: name=google-sudoers, GID=1000 May 10 00:44:28.869612 groupadd[1389]: group added to /etc/gshadow: name=google-sudoers May 10 00:44:28.881716 groupadd[1389]: new group: name=google-sudoers, GID=1000 May 10 00:44:28.899424 google-accounts[1371]: INFO Starting Google Accounts daemon. May 10 00:44:28.917179 sshd[1379]: pam_unix(sshd:session): session closed for user core May 10 00:44:28.919730 google-networking[1373]: INFO Starting Google Networking daemon. May 10 00:44:28.922480 systemd[1]: sshd@3-10.128.0.17:22-147.75.109.163:60978.service: Deactivated successfully. May 10 00:44:28.923627 systemd[1]: session-4.scope: Deactivated successfully. May 10 00:44:28.926455 systemd-logind[1227]: Session 4 logged out. Waiting for processes to exit. May 10 00:44:28.929869 systemd-logind[1227]: Removed session 4. May 10 00:44:28.944409 google-accounts[1371]: WARNING OS Login not installed. May 10 00:44:28.945539 google-accounts[1371]: INFO Creating a new user account for 0. May 10 00:44:28.953784 systemd-nspawn[1313]: useradd: invalid user name '0': use --badname to ignore May 10 00:44:28.954819 google-accounts[1371]: WARNING Could not create user 0. Command '['useradd', '-m', '-s', '/bin/bash', '-p', '*', '0']' returned non-zero exit status 3.. May 10 00:44:28.966961 systemd[1]: Started sshd@4-10.128.0.17:22-147.75.109.163:60988.service. May 10 00:44:29.259551 sshd[1403]: Accepted publickey for core from 147.75.109.163 port 60988 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:44:29.261234 sshd[1403]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:29.267884 systemd[1]: Started session-5.scope. May 10 00:44:29.268530 systemd-logind[1227]: New session 5 of user core. May 10 00:44:29.458337 sudo[1406]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 00:44:29.458782 sudo[1406]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:29.468464 dbus-daemon[1186]: \xd0\xed\xf5\u0018qU: received setenforce notice (enforcing=1420541904) May 10 00:44:29.470732 sudo[1406]: pam_unix(sudo:session): session closed for user root May 10 00:44:29.515665 sshd[1403]: pam_unix(sshd:session): session closed for user core May 10 00:44:29.521058 systemd-logind[1227]: Session 5 logged out. Waiting for processes to exit. May 10 00:44:29.521412 systemd[1]: sshd@4-10.128.0.17:22-147.75.109.163:60988.service: Deactivated successfully. May 10 00:44:29.522616 systemd[1]: session-5.scope: Deactivated successfully. May 10 00:44:29.523738 systemd-logind[1227]: Removed session 5. May 10 00:44:29.563452 systemd[1]: Started sshd@5-10.128.0.17:22-147.75.109.163:60998.service. May 10 00:44:29.857430 sshd[1410]: Accepted publickey for core from 147.75.109.163 port 60998 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:44:29.859060 sshd[1410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:29.865170 systemd-logind[1227]: New session 6 of user core. May 10 00:44:29.865898 systemd[1]: Started session-6.scope. May 10 00:44:30.037957 sudo[1414]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 00:44:30.038432 sudo[1414]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:30.043194 sudo[1414]: pam_unix(sudo:session): session closed for user root May 10 00:44:30.055831 sudo[1413]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 00:44:30.056287 sudo[1413]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:30.069158 systemd[1]: Stopping audit-rules.service... May 10 00:44:30.070000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:44:30.076729 kernel: kauditd_printk_skb: 213 callbacks suppressed May 10 00:44:30.076849 kernel: audit: type=1305 audit(1746837870.070:192): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 00:44:30.091296 auditctl[1417]: No rules May 10 00:44:30.070000 audit[1417]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc231a7e0 a2=420 a3=0 items=0 ppid=1 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.092636 systemd[1]: audit-rules.service: Deactivated successfully. May 10 00:44:30.092888 systemd[1]: Stopped audit-rules.service. May 10 00:44:30.095634 systemd[1]: Starting audit-rules.service... May 10 00:44:30.122201 kernel: audit: type=1300 audit(1746837870.070:192): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc231a7e0 a2=420 a3=0 items=0 ppid=1 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.122375 kernel: audit: type=1327 audit(1746837870.070:192): proctitle=2F7362696E2F617564697463746C002D44 May 10 00:44:30.070000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 00:44:30.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:30.136757 augenrules[1434]: No rules May 10 00:44:30.138294 systemd[1]: Finished audit-rules.service. May 10 00:44:30.140003 sudo[1413]: pam_unix(sudo:session): session closed for user root May 10 00:44:30.153256 kernel: audit: type=1131 audit(1746837870.092:193): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:30.153394 kernel: audit: type=1130 audit(1746837870.138:194): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:30.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:30.139000 audit[1413]: USER_END pid=1413 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:30.188460 sshd[1410]: pam_unix(sshd:session): session closed for user core May 10 00:44:30.193604 systemd-logind[1227]: Session 6 logged out. Waiting for processes to exit. May 10 00:44:30.195945 systemd[1]: sshd@5-10.128.0.17:22-147.75.109.163:60998.service: Deactivated successfully. May 10 00:44:30.197075 systemd[1]: session-6.scope: Deactivated successfully. May 10 00:44:30.199309 systemd-logind[1227]: Removed session 6. May 10 00:44:30.200362 kernel: audit: type=1106 audit(1746837870.139:195): pid=1413 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:30.200467 kernel: audit: type=1104 audit(1746837870.139:196): pid=1413 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:30.139000 audit[1413]: CRED_DISP pid=1413 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:30.190000 audit[1410]: USER_END pid=1410 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:44:30.234387 systemd[1]: Started sshd@6-10.128.0.17:22-147.75.109.163:32778.service. May 10 00:44:30.255591 kernel: audit: type=1106 audit(1746837870.190:197): pid=1410 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:44:30.280139 kernel: audit: type=1104 audit(1746837870.190:198): pid=1410 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:44:30.190000 audit[1410]: CRED_DISP pid=1410 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:44:30.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.17:22-147.75.109.163:60998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:30.234000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.17:22-147.75.109.163:32778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:30.305247 kernel: audit: type=1131 audit(1746837870.196:199): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.128.0.17:22-147.75.109.163:60998 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:30.529000 audit[1440]: USER_ACCT pid=1440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:44:30.529740 sshd[1440]: Accepted publickey for core from 147.75.109.163 port 32778 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:44:30.530000 audit[1440]: CRED_ACQ pid=1440 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:44:30.530000 audit[1440]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee2ebf210 a2=3 a3=0 items=0 ppid=1 pid=1440 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.530000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:44:30.531698 sshd[1440]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:44:30.538554 systemd[1]: Started session-7.scope. May 10 00:44:30.539423 systemd-logind[1227]: New session 7 of user core. May 10 00:44:30.547000 audit[1440]: USER_START pid=1440 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:44:30.549000 audit[1442]: CRED_ACQ pid=1442 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:44:30.707000 audit[1443]: USER_ACCT pid=1443 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:30.707663 sudo[1443]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 00:44:30.707000 audit[1443]: CRED_REFR pid=1443 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:30.708130 sudo[1443]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 00:44:30.710000 audit[1443]: USER_START pid=1443 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:44:30.742153 systemd[1]: Starting docker.service... May 10 00:44:30.794078 env[1453]: time="2025-05-10T00:44:30.793059075Z" level=info msg="Starting up" May 10 00:44:30.795869 env[1453]: time="2025-05-10T00:44:30.795818172Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:44:30.795869 env[1453]: time="2025-05-10T00:44:30.795845334Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:44:30.796052 env[1453]: time="2025-05-10T00:44:30.795885491Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:44:30.796052 env[1453]: time="2025-05-10T00:44:30.795902053Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:44:30.798033 env[1453]: time="2025-05-10T00:44:30.798007629Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 00:44:30.798155 env[1453]: time="2025-05-10T00:44:30.798137237Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 00:44:30.798274 env[1453]: time="2025-05-10T00:44:30.798248709Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 00:44:30.798351 env[1453]: time="2025-05-10T00:44:30.798335962Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 00:44:30.810238 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport4237878074-merged.mount: Deactivated successfully. May 10 00:44:30.838791 env[1453]: time="2025-05-10T00:44:30.838741444Z" level=info msg="Loading containers: start." May 10 00:44:30.928000 audit[1484]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1484 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.928000 audit[1484]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffebd367cc0 a2=0 a3=7ffebd367cac items=0 ppid=1453 pid=1484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 00:44:30.931000 audit[1486]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1486 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.931000 audit[1486]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc18ddb170 a2=0 a3=7ffc18ddb15c items=0 ppid=1453 pid=1486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.931000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 00:44:30.934000 audit[1488]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1488 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.934000 audit[1488]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffd2f79a660 a2=0 a3=7ffd2f79a64c items=0 ppid=1453 pid=1488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.934000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:30.937000 audit[1490]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1490 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.937000 audit[1490]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc4506b720 a2=0 a3=7ffc4506b70c items=0 ppid=1453 pid=1490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:44:30.941000 audit[1492]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1492 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.941000 audit[1492]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7eb8c220 a2=0 a3=7ffc7eb8c20c items=0 ppid=1453 pid=1492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.941000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 00:44:30.963000 audit[1497]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1497 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.963000 audit[1497]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe37d60640 a2=0 a3=7ffe37d6062c items=0 ppid=1453 pid=1497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.963000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 00:44:30.974000 audit[1499]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1499 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.974000 audit[1499]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd4f0a57d0 a2=0 a3=7ffd4f0a57bc items=0 ppid=1453 pid=1499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.974000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 00:44:30.978000 audit[1501]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1501 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.978000 audit[1501]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc3bddfb00 a2=0 a3=7ffc3bddfaec items=0 ppid=1453 pid=1501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.978000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 00:44:30.981000 audit[1503]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1503 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.981000 audit[1503]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc783f9630 a2=0 a3=7ffc783f961c items=0 ppid=1453 pid=1503 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.981000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:30.996000 audit[1507]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1507 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:30.996000 audit[1507]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffeb5d41050 a2=0 a3=7ffeb5d4103c items=0 ppid=1453 pid=1507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:30.996000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:31.002000 audit[1508]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1508 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.002000 audit[1508]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffdc0690760 a2=0 a3=7ffdc069074c items=0 ppid=1453 pid=1508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.002000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:31.021251 kernel: Initializing XFRM netlink socket May 10 00:44:31.067679 env[1453]: time="2025-05-10T00:44:31.067535931Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 00:44:31.103000 audit[1516]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1516 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.103000 audit[1516]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd96d529e0 a2=0 a3=7ffd96d529cc items=0 ppid=1453 pid=1516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.103000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 00:44:31.116000 audit[1519]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1519 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.116000 audit[1519]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffd47071100 a2=0 a3=7ffd470710ec items=0 ppid=1453 pid=1519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 00:44:31.121000 audit[1522]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1522 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.121000 audit[1522]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc740ff060 a2=0 a3=7ffc740ff04c items=0 ppid=1453 pid=1522 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.121000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 00:44:31.125000 audit[1524]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1524 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.125000 audit[1524]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff3a15e5c0 a2=0 a3=7fff3a15e5ac items=0 ppid=1453 pid=1524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.125000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 00:44:31.128000 audit[1526]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1526 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.128000 audit[1526]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff89d8f3d0 a2=0 a3=7fff89d8f3bc items=0 ppid=1453 pid=1526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 00:44:31.131000 audit[1528]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1528 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.131000 audit[1528]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff1e0a2b90 a2=0 a3=7fff1e0a2b7c items=0 ppid=1453 pid=1528 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 00:44:31.134000 audit[1530]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1530 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.134000 audit[1530]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcb122d0b0 a2=0 a3=7ffcb122d09c items=0 ppid=1453 pid=1530 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.134000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 00:44:31.146000 audit[1533]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1533 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.146000 audit[1533]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe39c7e600 a2=0 a3=7ffe39c7e5ec items=0 ppid=1453 pid=1533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.146000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 00:44:31.150000 audit[1535]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1535 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.150000 audit[1535]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffd114c46f0 a2=0 a3=7ffd114c46dc items=0 ppid=1453 pid=1535 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.150000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 00:44:31.154000 audit[1537]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1537 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.154000 audit[1537]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd48588a50 a2=0 a3=7ffd48588a3c items=0 ppid=1453 pid=1537 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.154000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 00:44:31.157000 audit[1539]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1539 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.157000 audit[1539]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe5b37af20 a2=0 a3=7ffe5b37af0c items=0 ppid=1453 pid=1539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.157000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 00:44:31.158270 systemd-networkd[1024]: docker0: Link UP May 10 00:44:31.172000 audit[1543]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1543 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.172000 audit[1543]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff81ccc5d0 a2=0 a3=7fff81ccc5bc items=0 ppid=1453 pid=1543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:31.178000 audit[1544]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1544 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:31.178000 audit[1544]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffeb3a97750 a2=0 a3=7ffeb3a9773c items=0 ppid=1453 pid=1544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:31.178000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 00:44:31.179632 env[1453]: time="2025-05-10T00:44:31.179581831Z" level=info msg="Loading containers: done." May 10 00:44:31.201647 env[1453]: time="2025-05-10T00:44:31.201578668Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 00:44:31.201933 env[1453]: time="2025-05-10T00:44:31.201896887Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 00:44:31.202093 env[1453]: time="2025-05-10T00:44:31.202055411Z" level=info msg="Daemon has completed initialization" May 10 00:44:31.226066 systemd[1]: Started docker.service. May 10 00:44:31.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:31.234807 env[1453]: time="2025-05-10T00:44:31.234733163Z" level=info msg="API listen on /run/docker.sock" May 10 00:44:32.430493 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 00:44:32.430840 systemd[1]: Stopped kubelet.service. May 10 00:44:32.430938 systemd[1]: kubelet.service: Consumed 1.511s CPU time. May 10 00:44:32.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.433183 systemd[1]: Starting kubelet.service... May 10 00:44:32.447194 env[1215]: time="2025-05-10T00:44:32.447122489Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 10 00:44:32.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:32.695313 systemd[1]: Started kubelet.service. May 10 00:44:32.761962 kubelet[1585]: E0510 00:44:32.761916 1585 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:32.766021 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:32.766173 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:32.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:33.229874 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1547190200.mount: Deactivated successfully. May 10 00:44:35.164462 env[1215]: time="2025-05-10T00:44:35.164359631Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:35.167515 env[1215]: time="2025-05-10T00:44:35.167458915Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:35.170454 env[1215]: time="2025-05-10T00:44:35.170397474Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:35.172982 env[1215]: time="2025-05-10T00:44:35.172936790Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:35.173957 env[1215]: time="2025-05-10T00:44:35.173909741Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 10 00:44:35.189113 env[1215]: time="2025-05-10T00:44:35.189057890Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 10 00:44:37.037986 env[1215]: time="2025-05-10T00:44:37.037915495Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:37.040775 env[1215]: time="2025-05-10T00:44:37.040723387Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:37.043618 env[1215]: time="2025-05-10T00:44:37.043570366Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:37.046277 env[1215]: time="2025-05-10T00:44:37.046198377Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:37.047365 env[1215]: time="2025-05-10T00:44:37.047316639Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 10 00:44:37.063544 env[1215]: time="2025-05-10T00:44:37.063484944Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 10 00:44:38.589591 env[1215]: time="2025-05-10T00:44:38.589510305Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:38.593286 env[1215]: time="2025-05-10T00:44:38.593186482Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:38.596235 env[1215]: time="2025-05-10T00:44:38.596155337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:38.599514 env[1215]: time="2025-05-10T00:44:38.599452066Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:38.601242 env[1215]: time="2025-05-10T00:44:38.601177847Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 10 00:44:38.616208 env[1215]: time="2025-05-10T00:44:38.616152879Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 00:44:39.679757 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount467228996.mount: Deactivated successfully. May 10 00:44:40.398456 env[1215]: time="2025-05-10T00:44:40.398356281Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:40.401659 env[1215]: time="2025-05-10T00:44:40.401599593Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:40.404342 env[1215]: time="2025-05-10T00:44:40.404289987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:40.406790 env[1215]: time="2025-05-10T00:44:40.406716570Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:40.407729 env[1215]: time="2025-05-10T00:44:40.407680747Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 00:44:40.423310 env[1215]: time="2025-05-10T00:44:40.423242928Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 00:44:40.927188 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2954194824.mount: Deactivated successfully. May 10 00:44:42.061788 env[1215]: time="2025-05-10T00:44:42.061703392Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:42.065031 env[1215]: time="2025-05-10T00:44:42.064969393Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:42.068431 env[1215]: time="2025-05-10T00:44:42.068379443Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:42.070968 env[1215]: time="2025-05-10T00:44:42.070922379Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:42.072456 env[1215]: time="2025-05-10T00:44:42.072411434Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 00:44:42.092101 env[1215]: time="2025-05-10T00:44:42.092042488Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 10 00:44:42.448076 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount899396999.mount: Deactivated successfully. May 10 00:44:42.453706 env[1215]: time="2025-05-10T00:44:42.453640657Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:42.456313 env[1215]: time="2025-05-10T00:44:42.456262497Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:42.458627 env[1215]: time="2025-05-10T00:44:42.458582800Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:42.461115 env[1215]: time="2025-05-10T00:44:42.461066474Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:42.461953 env[1215]: time="2025-05-10T00:44:42.461900409Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 10 00:44:42.476844 env[1215]: time="2025-05-10T00:44:42.476794827Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 10 00:44:42.908044 kernel: kauditd_printk_skb: 88 callbacks suppressed May 10 00:44:42.908424 kernel: audit: type=1130 audit(1746837882.877:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:42.877000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:42.877549 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 00:44:42.877831 systemd[1]: Stopped kubelet.service. May 10 00:44:42.883000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:42.909493 systemd[1]: Starting kubelet.service... May 10 00:44:42.912266 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount227384287.mount: Deactivated successfully. May 10 00:44:42.933302 kernel: audit: type=1131 audit(1746837882.883:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:43.142160 systemd[1]: Started kubelet.service. May 10 00:44:43.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:43.165260 kernel: audit: type=1130 audit(1746837883.142:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:43.235044 kubelet[1627]: E0510 00:44:43.234894 1627 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 00:44:43.266277 kernel: audit: type=1131 audit(1746837883.243:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:43.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 00:44:43.243086 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 00:44:43.243376 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 00:44:46.109805 env[1215]: time="2025-05-10T00:44:46.109717639Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:46.113241 env[1215]: time="2025-05-10T00:44:46.113160216Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:46.116093 env[1215]: time="2025-05-10T00:44:46.116041556Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:46.118837 env[1215]: time="2025-05-10T00:44:46.118788568Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:46.119910 env[1215]: time="2025-05-10T00:44:46.119856840Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 10 00:44:49.173101 systemd[1]: systemd-hostnamed.service: Deactivated successfully. May 10 00:44:49.197522 kernel: audit: type=1131 audit(1746837889.173:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:49.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hostnamed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:49.212000 audit: BPF prog-id=43 op=UNLOAD May 10 00:44:49.227292 kernel: audit: type=1334 audit(1746837889.212:243): prog-id=43 op=UNLOAD May 10 00:44:49.227405 kernel: audit: type=1334 audit(1746837889.212:244): prog-id=42 op=UNLOAD May 10 00:44:49.212000 audit: BPF prog-id=42 op=UNLOAD May 10 00:44:49.234796 kernel: audit: type=1334 audit(1746837889.212:245): prog-id=41 op=UNLOAD May 10 00:44:49.212000 audit: BPF prog-id=41 op=UNLOAD May 10 00:44:49.648892 systemd[1]: Stopped kubelet.service. May 10 00:44:49.672202 kernel: audit: type=1130 audit(1746837889.649:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:49.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:49.652713 systemd[1]: Starting kubelet.service... May 10 00:44:49.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:49.696271 kernel: audit: type=1131 audit(1746837889.649:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:49.715644 systemd[1]: Reloading. May 10 00:44:49.868078 /usr/lib/systemd/system-generators/torcx-generator[1720]: time="2025-05-10T00:44:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:49.868133 /usr/lib/systemd/system-generators/torcx-generator[1720]: time="2025-05-10T00:44:49Z" level=info msg="torcx already run" May 10 00:44:49.987396 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:49.987423 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:50.011719 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:50.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.128291 kernel: audit: type=1400 audit(1746837890.106:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172981 kernel: audit: type=1400 audit(1746837890.106:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.173164 kernel: audit: type=1400 audit(1746837890.106:250): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit: BPF prog-id=46 op=LOAD May 10 00:44:50.127000 audit: BPF prog-id=38 op=UNLOAD May 10 00:44:50.195240 kernel: audit: type=1400 audit(1746837890.106:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit: BPF prog-id=47 op=LOAD May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.127000 audit: BPF prog-id=48 op=LOAD May 10 00:44:50.127000 audit: BPF prog-id=39 op=UNLOAD May 10 00:44:50.127000 audit: BPF prog-id=40 op=UNLOAD May 10 00:44:50.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit: BPF prog-id=49 op=LOAD May 10 00:44:50.151000 audit: BPF prog-id=27 op=UNLOAD May 10 00:44:50.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit: BPF prog-id=50 op=LOAD May 10 00:44:50.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.172000 audit: BPF prog-id=51 op=LOAD May 10 00:44:50.172000 audit: BPF prog-id=28 op=UNLOAD May 10 00:44:50.172000 audit: BPF prog-id=29 op=UNLOAD May 10 00:44:50.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.194000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.194000 audit: BPF prog-id=32 op=UNLOAD May 10 00:44:50.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.195000 audit: BPF prog-id=55 op=LOAD May 10 00:44:50.196000 audit: BPF prog-id=33 op=UNLOAD May 10 00:44:50.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.196000 audit: BPF prog-id=56 op=LOAD May 10 00:44:50.197000 audit: BPF prog-id=44 op=UNLOAD May 10 00:44:50.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit: BPF prog-id=57 op=LOAD May 10 00:44:50.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.198000 audit: BPF prog-id=58 op=LOAD May 10 00:44:50.198000 audit: BPF prog-id=34 op=UNLOAD May 10 00:44:50.199000 audit: BPF prog-id=35 op=UNLOAD May 10 00:44:50.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.200000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.200000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.201000 audit: BPF prog-id=59 op=LOAD May 10 00:44:50.201000 audit: BPF prog-id=37 op=UNLOAD May 10 00:44:50.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:50.203000 audit: BPF prog-id=60 op=LOAD May 10 00:44:50.203000 audit: BPF prog-id=36 op=UNLOAD May 10 00:44:50.258816 systemd[1]: Started kubelet.service. May 10 00:44:50.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:50.263441 systemd[1]: Stopping kubelet.service... May 10 00:44:50.264021 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:44:50.264350 systemd[1]: Stopped kubelet.service. May 10 00:44:50.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:50.266994 systemd[1]: Starting kubelet.service... May 10 00:44:50.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:50.463390 systemd[1]: Started kubelet.service. May 10 00:44:50.532166 kubelet[1771]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:50.532683 kubelet[1771]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:44:50.532786 kubelet[1771]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:50.533036 kubelet[1771]: I0510 00:44:50.532993 1771 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:44:51.129805 kubelet[1771]: I0510 00:44:51.129734 1771 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:44:51.129805 kubelet[1771]: I0510 00:44:51.129780 1771 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:44:51.130153 kubelet[1771]: I0510 00:44:51.130115 1771 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:44:51.165014 kubelet[1771]: I0510 00:44:51.164974 1771 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:44:51.166499 kubelet[1771]: E0510 00:44:51.166468 1771 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.128.0.17:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.182406 kubelet[1771]: I0510 00:44:51.182354 1771 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:44:51.182808 kubelet[1771]: I0510 00:44:51.182730 1771 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:44:51.183085 kubelet[1771]: I0510 00:44:51.182791 1771 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:44:51.184600 kubelet[1771]: I0510 00:44:51.184551 1771 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:44:51.184600 kubelet[1771]: I0510 00:44:51.184594 1771 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:44:51.184827 kubelet[1771]: I0510 00:44:51.184793 1771 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:51.186583 kubelet[1771]: I0510 00:44:51.186534 1771 kubelet.go:400] "Attempting to sync node with API server" May 10 00:44:51.186583 kubelet[1771]: I0510 00:44:51.186576 1771 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:44:51.186788 kubelet[1771]: I0510 00:44:51.186615 1771 kubelet.go:312] "Adding apiserver pod source" May 10 00:44:51.186788 kubelet[1771]: I0510 00:44:51.186645 1771 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:44:51.201670 kubelet[1771]: W0510 00:44:51.201088 1771 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.201670 kubelet[1771]: E0510 00:44:51.201177 1771 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.201670 kubelet[1771]: W0510 00:44:51.201328 1771 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb&limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.201670 kubelet[1771]: E0510 00:44:51.201381 1771 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb&limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.201670 kubelet[1771]: I0510 00:44:51.201526 1771 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:44:51.207339 kubelet[1771]: I0510 00:44:51.207275 1771 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:44:51.207519 kubelet[1771]: W0510 00:44:51.207405 1771 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 00:44:51.208914 kubelet[1771]: I0510 00:44:51.208739 1771 server.go:1264] "Started kubelet" May 10 00:44:51.216056 kubelet[1771]: I0510 00:44:51.215255 1771 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:44:51.216720 kubelet[1771]: I0510 00:44:51.216662 1771 server.go:455] "Adding debug handlers to kubelet server" May 10 00:44:51.223080 kubelet[1771]: I0510 00:44:51.223002 1771 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:44:51.223678 kubelet[1771]: I0510 00:44:51.223647 1771 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:44:51.227000 audit[1771]: AVC avc: denied { mac_admin } for pid=1771 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.227000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:51.227000 audit[1771]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c8c2a0 a1=c000c8e4e0 a2=c000c8c270 a3=25 items=0 ppid=1 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:51.227000 audit[1771]: AVC avc: denied { mac_admin } for pid=1771 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.227000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:51.227000 audit[1771]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b51c60 a1=c000c8e4f8 a2=c000c8c330 a3=25 items=0 ppid=1 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.227000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:51.229828 kubelet[1771]: I0510 00:44:51.229027 1771 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:44:51.229828 kubelet[1771]: I0510 00:44:51.229090 1771 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:44:51.229828 kubelet[1771]: I0510 00:44:51.229179 1771 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:44:51.234625 kubelet[1771]: E0510 00:44:51.234397 1771 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.17:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.17:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb.183e03ce91afdfd0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,UID:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,},FirstTimestamp:2025-05-10 00:44:51.208699856 +0000 UTC m=+0.736824341,LastTimestamp:2025-05-10 00:44:51.208699856 +0000 UTC m=+0.736824341,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,}" May 10 00:44:51.236989 kubelet[1771]: I0510 00:44:51.236955 1771 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:44:51.237667 kubelet[1771]: I0510 00:44:51.237638 1771 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:44:51.237793 kubelet[1771]: I0510 00:44:51.237746 1771 reconciler.go:26] "Reconciler: start to sync state" May 10 00:44:51.239263 kubelet[1771]: W0510 00:44:51.239186 1771 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.239366 kubelet[1771]: E0510 00:44:51.239281 1771 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.239503 kubelet[1771]: E0510 00:44:51.239375 1771 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb?timeout=10s\": dial tcp 10.128.0.17:6443: connect: connection refused" interval="200ms" May 10 00:44:51.239877 kubelet[1771]: I0510 00:44:51.239845 1771 factory.go:221] Registration of the systemd container factory successfully May 10 00:44:51.239972 kubelet[1771]: I0510 00:44:51.239957 1771 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:44:51.241866 kubelet[1771]: I0510 00:44:51.241840 1771 factory.go:221] Registration of the containerd container factory successfully May 10 00:44:51.241000 audit[1781]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1781 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:51.241000 audit[1781]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff6c348690 a2=0 a3=7fff6c34867c items=0 ppid=1771 pid=1781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.241000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:44:51.243000 audit[1782]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:51.243000 audit[1782]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda7b8a280 a2=0 a3=7ffda7b8a26c items=0 ppid=1771 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.243000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:44:51.247000 audit[1784]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:51.247000 audit[1784]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe41049180 a2=0 a3=7ffe4104916c items=0 ppid=1771 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.247000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:51.251880 kubelet[1771]: E0510 00:44:51.251845 1771 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:44:51.251000 audit[1786]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:51.251000 audit[1786]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd124cee20 a2=0 a3=7ffd124cee0c items=0 ppid=1771 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.251000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:44:51.263000 audit[1789]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1789 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:51.263000 audit[1789]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffc4cf60bc0 a2=0 a3=7ffc4cf60bac items=0 ppid=1771 pid=1789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 00:44:51.267494 kubelet[1771]: I0510 00:44:51.267379 1771 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:44:51.267000 audit[1793]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:51.267000 audit[1793]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd805b9e50 a2=0 a3=7ffd805b9e3c items=0 ppid=1771 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.267000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 00:44:51.269554 kubelet[1771]: I0510 00:44:51.269442 1771 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:44:51.269554 kubelet[1771]: I0510 00:44:51.269484 1771 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:44:51.269554 kubelet[1771]: I0510 00:44:51.269514 1771 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:44:51.269717 kubelet[1771]: E0510 00:44:51.269581 1771 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:44:51.271000 audit[1794]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1794 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:51.271000 audit[1794]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd078e8c40 a2=0 a3=7ffd078e8c2c items=0 ppid=1771 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.271000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:44:51.274510 kubelet[1771]: W0510 00:44:51.274432 1771 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.274642 kubelet[1771]: E0510 00:44:51.274526 1771 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:51.275000 audit[1795]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:51.275000 audit[1795]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff112fcef0 a2=0 a3=7fff112fcedc items=0 ppid=1771 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 00:44:51.278618 kubelet[1771]: I0510 00:44:51.278590 1771 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:44:51.278618 kubelet[1771]: I0510 00:44:51.278616 1771 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:44:51.278796 kubelet[1771]: I0510 00:44:51.278640 1771 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:51.278000 audit[1798]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1798 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:51.278000 audit[1798]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd06355890 a2=0 a3=7ffd0635587c items=0 ppid=1771 pid=1798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.278000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:44:51.279000 audit[1797]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:51.279000 audit[1797]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe917bda80 a2=0 a3=7ffe917bda6c items=0 ppid=1771 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.279000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 00:44:51.281407 kubelet[1771]: I0510 00:44:51.281381 1771 policy_none.go:49] "None policy: Start" May 10 00:44:51.282322 kubelet[1771]: I0510 00:44:51.282298 1771 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:44:51.282424 kubelet[1771]: I0510 00:44:51.282332 1771 state_mem.go:35] "Initializing new in-memory state store" May 10 00:44:51.283000 audit[1800]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:44:51.283000 audit[1800]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc2e57dfe0 a2=0 a3=7ffc2e57dfcc items=0 ppid=1771 pid=1800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:44:51.283000 audit[1801]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:44:51.283000 audit[1801]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe036d67c0 a2=0 a3=7ffe036d67ac items=0 ppid=1771 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 00:44:51.290187 systemd[1]: Created slice kubepods.slice. May 10 00:44:51.297908 systemd[1]: Created slice kubepods-burstable.slice. May 10 00:44:51.302072 systemd[1]: Created slice kubepods-besteffort.slice. May 10 00:44:51.310720 kubelet[1771]: I0510 00:44:51.310672 1771 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:44:51.309000 audit[1771]: AVC avc: denied { mac_admin } for pid=1771 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:51.309000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:51.309000 audit[1771]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e0b620 a1=c000e249a8 a2=c000e0b5f0 a3=25 items=0 ppid=1 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:51.309000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:51.311295 kubelet[1771]: I0510 00:44:51.310780 1771 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:44:51.311295 kubelet[1771]: I0510 00:44:51.310996 1771 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:44:51.311295 kubelet[1771]: I0510 00:44:51.311187 1771 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:44:51.315031 kubelet[1771]: E0510 00:44:51.314838 1771 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" not found" May 10 00:44:51.342278 kubelet[1771]: I0510 00:44:51.342238 1771 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.342743 kubelet[1771]: E0510 00:44:51.342703 1771 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.17:6443/api/v1/nodes\": dial tcp 10.128.0.17:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.370085 kubelet[1771]: I0510 00:44:51.369998 1771 topology_manager.go:215] "Topology Admit Handler" podUID="c989dcf0b1438f990f462562e63d7781" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.376397 kubelet[1771]: I0510 00:44:51.376329 1771 topology_manager.go:215] "Topology Admit Handler" podUID="37a1f722fd3f0e2dfe2c955f3094d3a1" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.383384 kubelet[1771]: I0510 00:44:51.382259 1771 topology_manager.go:215] "Topology Admit Handler" podUID="6b50ce70b16bec73e861d5a4ecca649a" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.390438 systemd[1]: Created slice kubepods-burstable-podc989dcf0b1438f990f462562e63d7781.slice. May 10 00:44:51.408984 systemd[1]: Created slice kubepods-burstable-pod37a1f722fd3f0e2dfe2c955f3094d3a1.slice. May 10 00:44:51.415868 systemd[1]: Created slice kubepods-burstable-pod6b50ce70b16bec73e861d5a4ecca649a.slice. May 10 00:44:51.440414 kubelet[1771]: E0510 00:44:51.440343 1771 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb?timeout=10s\": dial tcp 10.128.0.17:6443: connect: connection refused" interval="400ms" May 10 00:44:51.539168 kubelet[1771]: I0510 00:44:51.539089 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c989dcf0b1438f990f462562e63d7781-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"c989dcf0b1438f990f462562e63d7781\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.539168 kubelet[1771]: I0510 00:44:51.539164 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6b50ce70b16bec73e861d5a4ecca649a-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"6b50ce70b16bec73e861d5a4ecca649a\") " pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.539828 kubelet[1771]: I0510 00:44:51.539202 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.539828 kubelet[1771]: I0510 00:44:51.539264 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c989dcf0b1438f990f462562e63d7781-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"c989dcf0b1438f990f462562e63d7781\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.539828 kubelet[1771]: I0510 00:44:51.539296 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c989dcf0b1438f990f462562e63d7781-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"c989dcf0b1438f990f462562e63d7781\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.539828 kubelet[1771]: I0510 00:44:51.539327 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.539970 kubelet[1771]: I0510 00:44:51.539357 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.539970 kubelet[1771]: I0510 00:44:51.539388 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.539970 kubelet[1771]: I0510 00:44:51.539420 1771 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.548631 kubelet[1771]: I0510 00:44:51.548577 1771 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.549066 kubelet[1771]: E0510 00:44:51.549003 1771 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.17:6443/api/v1/nodes\": dial tcp 10.128.0.17:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.706656 env[1215]: time="2025-05-10T00:44:51.706580462Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,Uid:c989dcf0b1438f990f462562e63d7781,Namespace:kube-system,Attempt:0,}" May 10 00:44:51.713647 env[1215]: time="2025-05-10T00:44:51.713552052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,Uid:37a1f722fd3f0e2dfe2c955f3094d3a1,Namespace:kube-system,Attempt:0,}" May 10 00:44:51.720804 env[1215]: time="2025-05-10T00:44:51.720743763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,Uid:6b50ce70b16bec73e861d5a4ecca649a,Namespace:kube-system,Attempt:0,}" May 10 00:44:51.841972 kubelet[1771]: E0510 00:44:51.841901 1771 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb?timeout=10s\": dial tcp 10.128.0.17:6443: connect: connection refused" interval="800ms" May 10 00:44:51.955677 kubelet[1771]: I0510 00:44:51.955639 1771 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:51.956105 kubelet[1771]: E0510 00:44:51.956047 1771 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.17:6443/api/v1/nodes\": dial tcp 10.128.0.17:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:52.107849 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3816155870.mount: Deactivated successfully. May 10 00:44:52.122698 env[1215]: time="2025-05-10T00:44:52.122626120Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.123954 env[1215]: time="2025-05-10T00:44:52.123898114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.126671 env[1215]: time="2025-05-10T00:44:52.126618567Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.130489 env[1215]: time="2025-05-10T00:44:52.130427505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.133417 env[1215]: time="2025-05-10T00:44:52.133359324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.134692 env[1215]: time="2025-05-10T00:44:52.134632940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.136242 env[1215]: time="2025-05-10T00:44:52.136167790Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.138332 env[1215]: time="2025-05-10T00:44:52.138279791Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.139244 env[1215]: time="2025-05-10T00:44:52.139172861Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.140199 env[1215]: time="2025-05-10T00:44:52.140162134Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.144655 env[1215]: time="2025-05-10T00:44:52.144589945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.158103 env[1215]: time="2025-05-10T00:44:52.158022401Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:44:52.193819 env[1215]: time="2025-05-10T00:44:52.193701082Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:52.193819 env[1215]: time="2025-05-10T00:44:52.193780031Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:52.194721 env[1215]: time="2025-05-10T00:44:52.193799133Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:52.194721 env[1215]: time="2025-05-10T00:44:52.194358937Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c71862e40b5e45ea6b45673c7d911e1790db0b2ef77b439325c04c7ce4cbce95 pid=1810 runtime=io.containerd.runc.v2 May 10 00:44:52.214823 env[1215]: time="2025-05-10T00:44:52.214634890Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:52.215155 env[1215]: time="2025-05-10T00:44:52.215097491Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:52.215401 env[1215]: time="2025-05-10T00:44:52.215343273Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:52.216569 env[1215]: time="2025-05-10T00:44:52.216495197Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7cc89838fb2d7c1dee256640ebf5c75cbd414db6ee2dd2452e58bd1279537687 pid=1827 runtime=io.containerd.runc.v2 May 10 00:44:52.225608 env[1215]: time="2025-05-10T00:44:52.225512185Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:44:52.225945 env[1215]: time="2025-05-10T00:44:52.225883605Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:44:52.226166 env[1215]: time="2025-05-10T00:44:52.226113591Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:44:52.226757 env[1215]: time="2025-05-10T00:44:52.226665833Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b7a9f2fb1d90d90df93f379a315d54ae49d59e568cf6b32ef32f51e76f63b5f8 pid=1847 runtime=io.containerd.runc.v2 May 10 00:44:52.235153 systemd[1]: Started cri-containerd-c71862e40b5e45ea6b45673c7d911e1790db0b2ef77b439325c04c7ce4cbce95.scope. May 10 00:44:52.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.259000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.259000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.260000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.260000 audit: BPF prog-id=61 op=LOAD May 10 00:44:52.261000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.261000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1810 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.261000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313836326534306235653435656136623435363733633764393131 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1810 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313836326534306235653435656136623435363733633764393131 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit: BPF prog-id=62 op=LOAD May 10 00:44:52.263000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00020ebd0 items=0 ppid=1810 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313836326534306235653435656136623435363733633764393131 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.263000 audit: BPF prog-id=63 op=LOAD May 10 00:44:52.263000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00020ec18 items=0 ppid=1810 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313836326534306235653435656136623435363733633764393131 May 10 00:44:52.264000 audit: BPF prog-id=63 op=UNLOAD May 10 00:44:52.264000 audit: BPF prog-id=62 op=UNLOAD May 10 00:44:52.264000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { perfmon } for pid=1828 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit[1828]: AVC avc: denied { bpf } for pid=1828 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.264000 audit: BPF prog-id=64 op=LOAD May 10 00:44:52.264000 audit[1828]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00020f028 items=0 ppid=1810 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337313836326534306235653435656136623435363733633764393131 May 10 00:44:52.270911 systemd[1]: Started cri-containerd-7cc89838fb2d7c1dee256640ebf5c75cbd414db6ee2dd2452e58bd1279537687.scope. May 10 00:44:52.289808 systemd[1]: Started cri-containerd-b7a9f2fb1d90d90df93f379a315d54ae49d59e568cf6b32ef32f51e76f63b5f8.scope. May 10 00:44:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.304000 audit: BPF prog-id=65 op=LOAD May 10 00:44:52.305000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.305000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1827 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633839383338666232643763316465653235363634306562663563 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1827 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633839383338666232643763316465653235363634306562663563 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.306000 audit: BPF prog-id=66 op=LOAD May 10 00:44:52.306000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003004f0 items=0 ppid=1827 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633839383338666232643763316465653235363634306562663563 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.307000 audit: BPF prog-id=67 op=LOAD May 10 00:44:52.307000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000300538 items=0 ppid=1827 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633839383338666232643763316465653235363634306562663563 May 10 00:44:52.309000 audit: BPF prog-id=67 op=UNLOAD May 10 00:44:52.309000 audit: BPF prog-id=66 op=UNLOAD May 10 00:44:52.309000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { perfmon } for pid=1850 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit[1850]: AVC avc: denied { bpf } for pid=1850 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.309000 audit: BPF prog-id=68 op=LOAD May 10 00:44:52.309000 audit[1850]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000300948 items=0 ppid=1827 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763633839383338666232643763316465653235363634306562663563 May 10 00:44:52.314503 kubelet[1771]: W0510 00:44:52.314366 1771 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.128.0.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:52.314503 kubelet[1771]: E0510 00:44:52.314465 1771 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.128.0.17:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:52.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.328000 audit: BPF prog-id=69 op=LOAD May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1847 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613966326662316439306439306466393366333739613331356435 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1847 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613966326662316439306439306466393366333739613331356435 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit: BPF prog-id=70 op=LOAD May 10 00:44:52.329000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001dbcd0 items=0 ppid=1847 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613966326662316439306439306466393366333739613331356435 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit: BPF prog-id=71 op=LOAD May 10 00:44:52.329000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001dbd18 items=0 ppid=1847 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613966326662316439306439306466393366333739613331356435 May 10 00:44:52.329000 audit: BPF prog-id=71 op=UNLOAD May 10 00:44:52.329000 audit: BPF prog-id=70 op=UNLOAD May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.329000 audit: BPF prog-id=72 op=LOAD May 10 00:44:52.329000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003de128 items=0 ppid=1847 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237613966326662316439306439306466393366333739613331356435 May 10 00:44:52.389950 env[1215]: time="2025-05-10T00:44:52.389775005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,Uid:37a1f722fd3f0e2dfe2c955f3094d3a1,Namespace:kube-system,Attempt:0,} returns sandbox id \"7cc89838fb2d7c1dee256640ebf5c75cbd414db6ee2dd2452e58bd1279537687\"" May 10 00:44:52.395197 env[1215]: time="2025-05-10T00:44:52.395144772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,Uid:c989dcf0b1438f990f462562e63d7781,Namespace:kube-system,Attempt:0,} returns sandbox id \"b7a9f2fb1d90d90df93f379a315d54ae49d59e568cf6b32ef32f51e76f63b5f8\"" May 10 00:44:52.402296 kubelet[1771]: E0510 00:44:52.401632 1771 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" hostnameMaxLen=63 truncatedHostname="kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf08" May 10 00:44:52.402296 kubelet[1771]: E0510 00:44:52.401847 1771 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" hostnameMaxLen=63 truncatedHostname="kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8f" May 10 00:44:52.417945 env[1215]: time="2025-05-10T00:44:52.417884601Z" level=info msg="CreateContainer within sandbox \"b7a9f2fb1d90d90df93f379a315d54ae49d59e568cf6b32ef32f51e76f63b5f8\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 00:44:52.427364 env[1215]: time="2025-05-10T00:44:52.421401677Z" level=info msg="CreateContainer within sandbox \"7cc89838fb2d7c1dee256640ebf5c75cbd414db6ee2dd2452e58bd1279537687\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 00:44:52.427565 env[1215]: time="2025-05-10T00:44:52.421875988Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,Uid:6b50ce70b16bec73e861d5a4ecca649a,Namespace:kube-system,Attempt:0,} returns sandbox id \"c71862e40b5e45ea6b45673c7d911e1790db0b2ef77b439325c04c7ce4cbce95\"" May 10 00:44:52.432932 kubelet[1771]: E0510 00:44:52.432884 1771 kubelet_pods.go:513] "Hostname for pod was too long, truncated it" podName="kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" hostnameMaxLen=63 truncatedHostname="kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8f" May 10 00:44:52.435655 env[1215]: time="2025-05-10T00:44:52.435570222Z" level=info msg="CreateContainer within sandbox \"c71862e40b5e45ea6b45673c7d911e1790db0b2ef77b439325c04c7ce4cbce95\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 00:44:52.462002 env[1215]: time="2025-05-10T00:44:52.461927498Z" level=info msg="CreateContainer within sandbox \"7cc89838fb2d7c1dee256640ebf5c75cbd414db6ee2dd2452e58bd1279537687\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"f6a18c310d8d772b9ef77e5c3d3d0fe5519fe9d760f6eaaef54aa8be2cde4803\"" May 10 00:44:52.462936 env[1215]: time="2025-05-10T00:44:52.462879737Z" level=info msg="StartContainer for \"f6a18c310d8d772b9ef77e5c3d3d0fe5519fe9d760f6eaaef54aa8be2cde4803\"" May 10 00:44:52.471497 env[1215]: time="2025-05-10T00:44:52.471426947Z" level=info msg="CreateContainer within sandbox \"b7a9f2fb1d90d90df93f379a315d54ae49d59e568cf6b32ef32f51e76f63b5f8\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"52ede2c9772fa1ff7a435a4f56e92a3e8cf1b5432057320c8a26917ccdbb708e\"" May 10 00:44:52.472751 env[1215]: time="2025-05-10T00:44:52.472582012Z" level=info msg="StartContainer for \"52ede2c9772fa1ff7a435a4f56e92a3e8cf1b5432057320c8a26917ccdbb708e\"" May 10 00:44:52.474547 env[1215]: time="2025-05-10T00:44:52.474499866Z" level=info msg="CreateContainer within sandbox \"c71862e40b5e45ea6b45673c7d911e1790db0b2ef77b439325c04c7ce4cbce95\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e4c82fb5788241e14a4bb3e9aac762e550bfdc9244299866644d3ac83ad51ffd\"" May 10 00:44:52.476357 env[1215]: time="2025-05-10T00:44:52.476274485Z" level=info msg="StartContainer for \"e4c82fb5788241e14a4bb3e9aac762e550bfdc9244299866644d3ac83ad51ffd\"" May 10 00:44:52.499368 systemd[1]: Started cri-containerd-f6a18c310d8d772b9ef77e5c3d3d0fe5519fe9d760f6eaaef54aa8be2cde4803.scope. May 10 00:44:52.523153 systemd[1]: Started cri-containerd-52ede2c9772fa1ff7a435a4f56e92a3e8cf1b5432057320c8a26917ccdbb708e.scope. May 10 00:44:52.538655 systemd[1]: Started cri-containerd-e4c82fb5788241e14a4bb3e9aac762e550bfdc9244299866644d3ac83ad51ffd.scope. May 10 00:44:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.564000 audit: BPF prog-id=73 op=LOAD May 10 00:44:52.565000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.568000 audit: BPF prog-id=74 op=LOAD May 10 00:44:52.565000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1827 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.565000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613138633331306438643737326239656637376535633364336430 May 10 00:44:52.570000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.570000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1827 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613138633331306438643737326239656637376535633364336430 May 10 00:44:52.571000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1810 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633832666235373838323431653134613462623365396161633736 May 10 00:44:52.571000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.571000 audit: BPF prog-id=75 op=LOAD May 10 00:44:52.571000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002816c0 items=0 ppid=1827 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613138633331306438643737326239656637376535633364336430 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit: BPF prog-id=76 op=LOAD May 10 00:44:52.573000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000281708 items=0 ppid=1827 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613138633331306438643737326239656637376535633364336430 May 10 00:44:52.573000 audit: BPF prog-id=76 op=UNLOAD May 10 00:44:52.573000 audit: BPF prog-id=75 op=UNLOAD May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { perfmon } for pid=1940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit[1940]: AVC avc: denied { bpf } for pid=1940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.573000 audit: BPF prog-id=77 op=LOAD May 10 00:44:52.573000 audit[1940]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000281b18 items=0 ppid=1827 pid=1940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636613138633331306438643737326239656637376535633364336430 May 10 00:44:52.571000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1810 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633832666235373838323431653134613462623365396161633736 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.574000 audit: BPF prog-id=78 op=LOAD May 10 00:44:52.574000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002974d0 items=0 ppid=1810 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633832666235373838323431653134613462623365396161633736 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit: BPF prog-id=79 op=LOAD May 10 00:44:52.575000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000297518 items=0 ppid=1810 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633832666235373838323431653134613462623365396161633736 May 10 00:44:52.575000 audit: BPF prog-id=79 op=UNLOAD May 10 00:44:52.575000 audit: BPF prog-id=78 op=UNLOAD May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { perfmon } for pid=1962 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit[1962]: AVC avc: denied { bpf } for pid=1962 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.575000 audit: BPF prog-id=80 op=LOAD May 10 00:44:52.575000 audit[1962]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000297928 items=0 ppid=1810 pid=1962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.575000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6534633832666235373838323431653134613462623365396161633736 May 10 00:44:52.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.584000 audit: BPF prog-id=81 op=LOAD May 10 00:44:52.586000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.587625 kubelet[1771]: W0510 00:44:52.587462 1771 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.128.0.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:52.587625 kubelet[1771]: E0510 00:44:52.587578 1771 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.128.0.17:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:52.586000 audit[1960]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1847 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656465326339373732666131666637613433356134663536653932 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1847 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656465326339373732666131666637613433356134663536653932 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.588000 audit: BPF prog-id=82 op=LOAD May 10 00:44:52.588000 audit[1960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025200 items=0 ppid=1847 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.588000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656465326339373732666131666637613433356134663536653932 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.589000 audit: BPF prog-id=83 op=LOAD May 10 00:44:52.589000 audit[1960]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025248 items=0 ppid=1847 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.589000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656465326339373732666131666637613433356134663536653932 May 10 00:44:52.591000 audit: BPF prog-id=83 op=UNLOAD May 10 00:44:52.591000 audit: BPF prog-id=82 op=UNLOAD May 10 00:44:52.591000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { perfmon } for pid=1960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit[1960]: AVC avc: denied { bpf } for pid=1960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:52.591000 audit: BPF prog-id=84 op=LOAD May 10 00:44:52.591000 audit[1960]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025658 items=0 ppid=1847 pid=1960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:52.591000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532656465326339373732666131666637613433356134663536653932 May 10 00:44:52.638867 env[1215]: time="2025-05-10T00:44:52.638767926Z" level=info msg="StartContainer for \"f6a18c310d8d772b9ef77e5c3d3d0fe5519fe9d760f6eaaef54aa8be2cde4803\" returns successfully" May 10 00:44:52.642598 kubelet[1771]: E0510 00:44:52.642439 1771 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.128.0.17:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb?timeout=10s\": dial tcp 10.128.0.17:6443: connect: connection refused" interval="1.6s" May 10 00:44:52.651947 kubelet[1771]: E0510 00:44:52.651552 1771 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.128.0.17:6443/api/v1/namespaces/default/events\": dial tcp 10.128.0.17:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb.183e03ce91afdfd0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,UID:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,},FirstTimestamp:2025-05-10 00:44:51.208699856 +0000 UTC m=+0.736824341,LastTimestamp:2025-05-10 00:44:51.208699856 +0000 UTC m=+0.736824341,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,}" May 10 00:44:52.651947 kubelet[1771]: W0510 00:44:52.651812 1771 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.128.0.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb&limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:52.651947 kubelet[1771]: E0510 00:44:52.651883 1771 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.128.0.17:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb&limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:52.671283 env[1215]: time="2025-05-10T00:44:52.671198821Z" level=info msg="StartContainer for \"e4c82fb5788241e14a4bb3e9aac762e550bfdc9244299866644d3ac83ad51ffd\" returns successfully" May 10 00:44:52.708078 env[1215]: time="2025-05-10T00:44:52.708007500Z" level=info msg="StartContainer for \"52ede2c9772fa1ff7a435a4f56e92a3e8cf1b5432057320c8a26917ccdbb708e\" returns successfully" May 10 00:44:52.758982 kubelet[1771]: W0510 00:44:52.758841 1771 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.128.0.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:52.758982 kubelet[1771]: E0510 00:44:52.758933 1771 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.128.0.17:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.128.0.17:6443: connect: connection refused May 10 00:44:52.763829 kubelet[1771]: I0510 00:44:52.763377 1771 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:52.763829 kubelet[1771]: E0510 00:44:52.763787 1771 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.128.0.17:6443/api/v1/nodes\": dial tcp 10.128.0.17:6443: connect: connection refused" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:54.372232 kubelet[1771]: I0510 00:44:54.372173 1771 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:55.426938 kernel: kauditd_printk_skb: 619 callbacks suppressed May 10 00:44:55.427175 kernel: audit: type=1400 audit(1746837895.393:517): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.393000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.393000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006677290 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.472361 kernel: audit: type=1300 audit(1746837895.393:517): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006677290 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.393000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.520242 kernel: audit: type=1327 audit(1746837895.393:517): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.393000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.551365 kernel: audit: type=1400 audit(1746837895.393:518): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.393000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006677320 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.586247 kernel: audit: type=1300 audit(1746837895.393:518): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006677320 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.393000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.397000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.661776 kernel: audit: type=1327 audit(1746837895.393:518): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.661975 kernel: audit: type=1400 audit(1746837895.397:519): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.662059 kernel: audit: type=1300 audit(1746837895.397:519): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006ec3c00 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.397000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006ec3c00 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.397000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.724729 kernel: audit: type=1327 audit(1746837895.397:519): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.397000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.754254 kernel: audit: type=1400 audit(1746837895.397:520): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.397000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006ec3de0 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.397000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.398000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.398000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006677560 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.429000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.429000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4e a1=c0047d1080 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:44:55.429000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:44:55.732000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.732000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c0007ead80 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:44:55.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.732000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:55.732000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000153a60 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:44:55.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:55.858347 kubelet[1771]: E0510 00:44:55.858276 1771 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" not found" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:55.924947 kubelet[1771]: I0510 00:44:55.924895 1771 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:56.203844 kubelet[1771]: I0510 00:44:56.203786 1771 apiserver.go:52] "Watching apiserver" May 10 00:44:56.238880 kubelet[1771]: I0510 00:44:56.238810 1771 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:44:57.939054 systemd[1]: Reloading. May 10 00:44:58.066914 /usr/lib/systemd/system-generators/torcx-generator[2062]: time="2025-05-10T00:44:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 00:44:58.066968 /usr/lib/systemd/system-generators/torcx-generator[2062]: time="2025-05-10T00:44:58Z" level=info msg="torcx already run" May 10 00:44:58.177601 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 00:44:58.177635 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 00:44:58.204138 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 00:44:58.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.321000 audit: BPF prog-id=85 op=LOAD May 10 00:44:58.321000 audit: BPF prog-id=81 op=UNLOAD May 10 00:44:58.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit: BPF prog-id=86 op=LOAD May 10 00:44:58.327000 audit: BPF prog-id=46 op=UNLOAD May 10 00:44:58.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.327000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit: BPF prog-id=87 op=LOAD May 10 00:44:58.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.328000 audit: BPF prog-id=88 op=LOAD May 10 00:44:58.328000 audit: BPF prog-id=47 op=UNLOAD May 10 00:44:58.328000 audit: BPF prog-id=48 op=UNLOAD May 10 00:44:58.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.330000 audit: BPF prog-id=89 op=LOAD May 10 00:44:58.330000 audit: BPF prog-id=74 op=UNLOAD May 10 00:44:58.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.332000 audit: BPF prog-id=90 op=LOAD May 10 00:44:58.332000 audit: BPF prog-id=61 op=UNLOAD May 10 00:44:58.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.335000 audit: BPF prog-id=91 op=LOAD May 10 00:44:58.335000 audit: BPF prog-id=49 op=UNLOAD May 10 00:44:58.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit: BPF prog-id=92 op=LOAD May 10 00:44:58.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.336000 audit: BPF prog-id=93 op=LOAD May 10 00:44:58.336000 audit: BPF prog-id=50 op=UNLOAD May 10 00:44:58.336000 audit: BPF prog-id=51 op=UNLOAD May 10 00:44:58.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.337000 audit: BPF prog-id=94 op=LOAD May 10 00:44:58.337000 audit: BPF prog-id=73 op=UNLOAD May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit: BPF prog-id=95 op=LOAD May 10 00:44:58.338000 audit: BPF prog-id=52 op=UNLOAD May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit: BPF prog-id=96 op=LOAD May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.338000 audit: BPF prog-id=97 op=LOAD May 10 00:44:58.338000 audit: BPF prog-id=53 op=UNLOAD May 10 00:44:58.338000 audit: BPF prog-id=54 op=UNLOAD May 10 00:44:58.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.340000 audit: BPF prog-id=98 op=LOAD May 10 00:44:58.340000 audit: BPF prog-id=55 op=UNLOAD May 10 00:44:58.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.341000 audit: BPF prog-id=99 op=LOAD May 10 00:44:58.341000 audit: BPF prog-id=56 op=UNLOAD May 10 00:44:58.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.342000 audit: BPF prog-id=100 op=LOAD May 10 00:44:58.342000 audit: BPF prog-id=69 op=UNLOAD May 10 00:44:58.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.343000 audit: BPF prog-id=101 op=LOAD May 10 00:44:58.343000 audit: BPF prog-id=65 op=UNLOAD May 10 00:44:58.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit: BPF prog-id=102 op=LOAD May 10 00:44:58.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.345000 audit: BPF prog-id=103 op=LOAD May 10 00:44:58.345000 audit: BPF prog-id=57 op=UNLOAD May 10 00:44:58.345000 audit: BPF prog-id=58 op=UNLOAD May 10 00:44:58.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.347000 audit: BPF prog-id=104 op=LOAD May 10 00:44:58.347000 audit: BPF prog-id=59 op=UNLOAD May 10 00:44:58.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.350000 audit: BPF prog-id=105 op=LOAD May 10 00:44:58.350000 audit: BPF prog-id=60 op=UNLOAD May 10 00:44:58.373583 kubelet[1771]: E0510 00:44:58.373409 1771 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb.183e03ce91afdfd0 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,UID:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,},FirstTimestamp:2025-05-10 00:44:51.208699856 +0000 UTC m=+0.736824341,LastTimestamp:2025-05-10 00:44:51.208699856 +0000 UTC m=+0.736824341,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb,}" May 10 00:44:58.374265 systemd[1]: Stopping kubelet.service... May 10 00:44:58.393759 systemd[1]: kubelet.service: Deactivated successfully. May 10 00:44:58.394058 systemd[1]: Stopped kubelet.service. May 10 00:44:58.394158 systemd[1]: kubelet.service: Consumed 1.184s CPU time. May 10 00:44:58.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.397710 systemd[1]: Starting kubelet.service... May 10 00:44:58.606725 systemd[1]: Started kubelet.service. May 10 00:44:58.607000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:44:58.700704 kubelet[2110]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:58.701166 kubelet[2110]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 00:44:58.701271 kubelet[2110]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 00:44:58.701451 kubelet[2110]: I0510 00:44:58.701410 2110 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 00:44:58.707554 kubelet[2110]: I0510 00:44:58.707503 2110 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 00:44:58.707554 kubelet[2110]: I0510 00:44:58.707536 2110 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 00:44:58.707862 kubelet[2110]: I0510 00:44:58.707824 2110 server.go:927] "Client rotation is on, will bootstrap in background" May 10 00:44:58.711439 kubelet[2110]: I0510 00:44:58.710255 2110 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 00:44:58.712241 kubelet[2110]: I0510 00:44:58.712168 2110 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 00:44:58.725404 kubelet[2110]: I0510 00:44:58.725311 2110 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 00:44:58.725709 kubelet[2110]: I0510 00:44:58.725643 2110 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 00:44:58.725958 kubelet[2110]: I0510 00:44:58.725696 2110 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 00:44:58.726131 kubelet[2110]: I0510 00:44:58.725971 2110 topology_manager.go:138] "Creating topology manager with none policy" May 10 00:44:58.726131 kubelet[2110]: I0510 00:44:58.725995 2110 container_manager_linux.go:301] "Creating device plugin manager" May 10 00:44:58.726131 kubelet[2110]: I0510 00:44:58.726066 2110 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:58.726333 kubelet[2110]: I0510 00:44:58.726205 2110 kubelet.go:400] "Attempting to sync node with API server" May 10 00:44:58.726333 kubelet[2110]: I0510 00:44:58.726258 2110 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 00:44:58.726333 kubelet[2110]: I0510 00:44:58.726291 2110 kubelet.go:312] "Adding apiserver pod source" May 10 00:44:58.726333 kubelet[2110]: I0510 00:44:58.726318 2110 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 00:44:58.736278 kubelet[2110]: I0510 00:44:58.729424 2110 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 00:44:58.736278 kubelet[2110]: I0510 00:44:58.729672 2110 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 00:44:58.736278 kubelet[2110]: I0510 00:44:58.732473 2110 server.go:1264] "Started kubelet" May 10 00:44:58.736000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.736000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:58.736000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00022f080 a1=c0008d10e0 a2=c00022eff0 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.736000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:58.736000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.736000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:58.736000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000643600 a1=c0008d10f8 a2=c00022f2c0 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.736000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:58.737704 kubelet[2110]: I0510 00:44:58.737031 2110 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 00:44:58.737704 kubelet[2110]: I0510 00:44:58.737090 2110 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 00:44:58.737704 kubelet[2110]: I0510 00:44:58.737136 2110 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 00:44:58.746632 kubelet[2110]: I0510 00:44:58.746558 2110 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 00:44:58.749577 kubelet[2110]: I0510 00:44:58.749544 2110 server.go:455] "Adding debug handlers to kubelet server" May 10 00:44:58.751167 kubelet[2110]: I0510 00:44:58.751081 2110 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 00:44:58.751500 kubelet[2110]: I0510 00:44:58.751475 2110 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 00:44:58.760165 kubelet[2110]: I0510 00:44:58.760131 2110 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 00:44:58.766460 kubelet[2110]: I0510 00:44:58.766423 2110 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 00:44:58.766895 kubelet[2110]: I0510 00:44:58.766871 2110 reconciler.go:26] "Reconciler: start to sync state" May 10 00:44:58.776543 kubelet[2110]: E0510 00:44:58.776426 2110 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 00:44:58.777115 kubelet[2110]: I0510 00:44:58.777085 2110 factory.go:221] Registration of the containerd container factory successfully May 10 00:44:58.777115 kubelet[2110]: I0510 00:44:58.777114 2110 factory.go:221] Registration of the systemd container factory successfully May 10 00:44:58.777350 kubelet[2110]: I0510 00:44:58.777285 2110 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 00:44:58.793684 kubelet[2110]: I0510 00:44:58.793641 2110 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 00:44:58.799887 kubelet[2110]: I0510 00:44:58.799481 2110 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 00:44:58.799887 kubelet[2110]: I0510 00:44:58.799591 2110 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 00:44:58.799887 kubelet[2110]: I0510 00:44:58.799618 2110 kubelet.go:2337] "Starting kubelet main sync loop" May 10 00:44:58.799887 kubelet[2110]: E0510 00:44:58.799732 2110 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 00:44:58.848104 kubelet[2110]: I0510 00:44:58.848075 2110 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 00:44:58.848350 kubelet[2110]: I0510 00:44:58.848331 2110 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 00:44:58.848450 kubelet[2110]: I0510 00:44:58.848439 2110 state_mem.go:36] "Initialized new in-memory state store" May 10 00:44:58.848702 kubelet[2110]: I0510 00:44:58.848685 2110 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 00:44:58.848823 kubelet[2110]: I0510 00:44:58.848795 2110 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 00:44:58.848892 kubelet[2110]: I0510 00:44:58.848880 2110 policy_none.go:49] "None policy: Start" May 10 00:44:58.849829 kubelet[2110]: I0510 00:44:58.849809 2110 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 00:44:58.849976 kubelet[2110]: I0510 00:44:58.849962 2110 state_mem.go:35] "Initializing new in-memory state store" May 10 00:44:58.850258 kubelet[2110]: I0510 00:44:58.850239 2110 state_mem.go:75] "Updated machine memory state" May 10 00:44:58.856371 kubelet[2110]: I0510 00:44:58.856341 2110 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 00:44:58.856000 audit[2110]: AVC avc: denied { mac_admin } for pid=2110 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:44:58.856000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 00:44:58.856000 audit[2110]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008cd3e0 a1=c000b8b080 a2=c0008cd3b0 a3=25 items=0 ppid=1 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:44:58.856000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 00:44:58.857310 kubelet[2110]: I0510 00:44:58.857282 2110 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 00:44:58.857658 kubelet[2110]: I0510 00:44:58.857602 2110 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 00:44:58.857908 kubelet[2110]: I0510 00:44:58.857890 2110 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 00:44:58.878639 kubelet[2110]: I0510 00:44:58.878579 2110 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.893038 kubelet[2110]: I0510 00:44:58.893001 2110 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.893370 kubelet[2110]: I0510 00:44:58.893355 2110 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.900398 kubelet[2110]: I0510 00:44:58.900303 2110 topology_manager.go:215] "Topology Admit Handler" podUID="c989dcf0b1438f990f462562e63d7781" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.900597 kubelet[2110]: I0510 00:44:58.900443 2110 topology_manager.go:215] "Topology Admit Handler" podUID="37a1f722fd3f0e2dfe2c955f3094d3a1" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.900597 kubelet[2110]: I0510 00:44:58.900534 2110 topology_manager.go:215] "Topology Admit Handler" podUID="6b50ce70b16bec73e861d5a4ecca649a" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.923229 kubelet[2110]: W0510 00:44:58.923173 2110 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters] May 10 00:44:58.925288 kubelet[2110]: W0510 00:44:58.925257 2110 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters] May 10 00:44:58.927356 kubelet[2110]: W0510 00:44:58.927329 2110 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must be no more than 63 characters] May 10 00:44:58.970922 kubelet[2110]: I0510 00:44:58.969774 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6b50ce70b16bec73e861d5a4ecca649a-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"6b50ce70b16bec73e861d5a4ecca649a\") " pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.970922 kubelet[2110]: I0510 00:44:58.969863 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/c989dcf0b1438f990f462562e63d7781-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"c989dcf0b1438f990f462562e63d7781\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.970922 kubelet[2110]: I0510 00:44:58.969899 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.970922 kubelet[2110]: I0510 00:44:58.970111 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.971239 kubelet[2110]: I0510 00:44:58.970174 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.971239 kubelet[2110]: I0510 00:44:58.970207 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.971239 kubelet[2110]: I0510 00:44:58.970278 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/c989dcf0b1438f990f462562e63d7781-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"c989dcf0b1438f990f462562e63d7781\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.971239 kubelet[2110]: I0510 00:44:58.970356 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/c989dcf0b1438f990f462562e63d7781-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"c989dcf0b1438f990f462562e63d7781\") " pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:58.971403 kubelet[2110]: I0510 00:44:58.970424 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/37a1f722fd3f0e2dfe2c955f3094d3a1-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" (UID: \"37a1f722fd3f0e2dfe2c955f3094d3a1\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:44:59.729245 kubelet[2110]: I0510 00:44:59.729154 2110 apiserver.go:52] "Watching apiserver" May 10 00:44:59.766896 kubelet[2110]: I0510 00:44:59.766850 2110 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 00:44:59.891808 kubelet[2110]: I0510 00:44:59.891712 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" podStartSLOduration=1.891673876 podStartE2EDuration="1.891673876s" podCreationTimestamp="2025-05-10 00:44:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:59.887433866 +0000 UTC m=+1.272507523" watchObservedRunningTime="2025-05-10 00:44:59.891673876 +0000 UTC m=+1.276747531" May 10 00:44:59.892085 kubelet[2110]: I0510 00:44:59.891896 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" podStartSLOduration=1.891886899 podStartE2EDuration="1.891886899s" podCreationTimestamp="2025-05-10 00:44:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:59.871655991 +0000 UTC m=+1.256729657" watchObservedRunningTime="2025-05-10 00:44:59.891886899 +0000 UTC m=+1.276960550" May 10 00:44:59.933000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:59.933000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eee820 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:44:59.933000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:59.934000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:59.934000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eee860 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:44:59.934000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:59.935000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:59.935000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eee8a0 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:44:59.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:59.936000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:44:59.936000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000eee8e0 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:44:59.936000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:44:59.948299 kubelet[2110]: I0510 00:44:59.948140 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" podStartSLOduration=1.9481120029999999 podStartE2EDuration="1.948112003s" podCreationTimestamp="2025-05-10 00:44:58 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:44:59.931446202 +0000 UTC m=+1.316519860" watchObservedRunningTime="2025-05-10 00:44:59.948112003 +0000 UTC m=+1.333185654" May 10 00:44:59.957000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=8294 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 00:44:59.957000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000ae6380 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:44:59.957000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:03.206909 update_engine[1202]: I0510 00:45:03.206346 1202 update_attempter.cc:509] Updating boot flags... May 10 00:45:03.220942 sudo[1443]: pam_unix(sudo:session): session closed for user root May 10 00:45:03.220000 audit[1443]: USER_END pid=1443 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:03.227405 kernel: kauditd_printk_skb: 287 callbacks suppressed May 10 00:45:03.227567 kernel: audit: type=1106 audit(1746837903.220:779): pid=1443 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:03.220000 audit[1443]: CRED_DISP pid=1443 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:03.281486 kernel: audit: type=1104 audit(1746837903.220:780): pid=1443 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 00:45:03.280710 sshd[1440]: pam_unix(sshd:session): session closed for user core May 10 00:45:03.285426 systemd[1]: sshd@6-10.128.0.17:22-147.75.109.163:32778.service: Deactivated successfully. May 10 00:45:03.286559 systemd[1]: session-7.scope: Deactivated successfully. May 10 00:45:03.286752 systemd[1]: session-7.scope: Consumed 6.225s CPU time. May 10 00:45:03.287631 systemd-logind[1227]: Session 7 logged out. Waiting for processes to exit. May 10 00:45:03.289772 systemd-logind[1227]: Removed session 7. May 10 00:45:03.281000 audit[1440]: USER_END pid=1440 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:03.328125 kernel: audit: type=1106 audit(1746837903.281:781): pid=1440 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:03.281000 audit[1440]: CRED_DISP pid=1440 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:03.358429 kernel: audit: type=1104 audit(1746837903.281:782): pid=1440 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:03.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.17:22-147.75.109.163:32778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:03.385467 kernel: audit: type=1131 audit(1746837903.284:783): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.128.0.17:22-147.75.109.163:32778 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:13.285487 kubelet[2110]: I0510 00:45:13.285435 2110 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 00:45:13.286474 env[1215]: time="2025-05-10T00:45:13.286417526Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 00:45:13.287004 kubelet[2110]: I0510 00:45:13.286840 2110 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 00:45:14.082544 kubelet[2110]: I0510 00:45:14.082486 2110 topology_manager.go:215] "Topology Admit Handler" podUID="9e4630ec-1b3b-4384-ad33-3c1eb67500ef" podNamespace="kube-system" podName="kube-proxy-hjfkn" May 10 00:45:14.091586 systemd[1]: Created slice kubepods-besteffort-pod9e4630ec_1b3b_4384_ad33_3c1eb67500ef.slice. May 10 00:45:14.167210 kubelet[2110]: I0510 00:45:14.167149 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/9e4630ec-1b3b-4384-ad33-3c1eb67500ef-lib-modules\") pod \"kube-proxy-hjfkn\" (UID: \"9e4630ec-1b3b-4384-ad33-3c1eb67500ef\") " pod="kube-system/kube-proxy-hjfkn" May 10 00:45:14.167564 kubelet[2110]: I0510 00:45:14.167534 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/9e4630ec-1b3b-4384-ad33-3c1eb67500ef-kube-proxy\") pod \"kube-proxy-hjfkn\" (UID: \"9e4630ec-1b3b-4384-ad33-3c1eb67500ef\") " pod="kube-system/kube-proxy-hjfkn" May 10 00:45:14.167732 kubelet[2110]: I0510 00:45:14.167710 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/9e4630ec-1b3b-4384-ad33-3c1eb67500ef-xtables-lock\") pod \"kube-proxy-hjfkn\" (UID: \"9e4630ec-1b3b-4384-ad33-3c1eb67500ef\") " pod="kube-system/kube-proxy-hjfkn" May 10 00:45:14.167894 kubelet[2110]: I0510 00:45:14.167866 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prvq9\" (UniqueName: \"kubernetes.io/projected/9e4630ec-1b3b-4384-ad33-3c1eb67500ef-kube-api-access-prvq9\") pod \"kube-proxy-hjfkn\" (UID: \"9e4630ec-1b3b-4384-ad33-3c1eb67500ef\") " pod="kube-system/kube-proxy-hjfkn" May 10 00:45:14.319894 kubelet[2110]: I0510 00:45:14.319840 2110 topology_manager.go:215] "Topology Admit Handler" podUID="fe29c4a0-97f1-4e99-8165-55a084e45d9e" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-dk9r5" May 10 00:45:14.330156 systemd[1]: Created slice kubepods-besteffort-podfe29c4a0_97f1_4e99_8165_55a084e45d9e.slice. May 10 00:45:14.369997 kubelet[2110]: I0510 00:45:14.369823 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/fe29c4a0-97f1-4e99-8165-55a084e45d9e-var-lib-calico\") pod \"tigera-operator-797db67f8-dk9r5\" (UID: \"fe29c4a0-97f1-4e99-8165-55a084e45d9e\") " pod="tigera-operator/tigera-operator-797db67f8-dk9r5" May 10 00:45:14.369997 kubelet[2110]: I0510 00:45:14.369899 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x75cl\" (UniqueName: \"kubernetes.io/projected/fe29c4a0-97f1-4e99-8165-55a084e45d9e-kube-api-access-x75cl\") pod \"tigera-operator-797db67f8-dk9r5\" (UID: \"fe29c4a0-97f1-4e99-8165-55a084e45d9e\") " pod="tigera-operator/tigera-operator-797db67f8-dk9r5" May 10 00:45:14.403949 env[1215]: time="2025-05-10T00:45:14.403879213Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hjfkn,Uid:9e4630ec-1b3b-4384-ad33-3c1eb67500ef,Namespace:kube-system,Attempt:0,}" May 10 00:45:14.437445 env[1215]: time="2025-05-10T00:45:14.437322347Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:14.437761 env[1215]: time="2025-05-10T00:45:14.437391333Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:14.437761 env[1215]: time="2025-05-10T00:45:14.437433842Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:14.438150 env[1215]: time="2025-05-10T00:45:14.438034013Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ee4d47ff767ef419cf5f2387824d910b22d369b0ecdbe3f13598b064f9948e7d pid=2212 runtime=io.containerd.runc.v2 May 10 00:45:14.477169 systemd[1]: Started cri-containerd-ee4d47ff767ef419cf5f2387824d910b22d369b0ecdbe3f13598b064f9948e7d.scope. May 10 00:45:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.529417 kernel: audit: type=1400 audit(1746837914.507:784): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552483 kernel: audit: type=1400 audit(1746837914.507:785): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574401 kernel: audit: type=1400 audit(1746837914.507:786): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.597534 kernel: audit: type=1400 audit(1746837914.507:787): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.597729 kernel: audit: type=1400 audit(1746837914.507:788): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.638273 env[1215]: time="2025-05-10T00:45:14.637470821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-dk9r5,Uid:fe29c4a0-97f1-4e99-8165-55a084e45d9e,Namespace:tigera-operator,Attempt:0,}" May 10 00:45:14.639578 kernel: audit: type=1400 audit(1746837914.507:789): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.639710 kernel: audit: type=1400 audit(1746837914.507:790): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.507000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.672093 env[1215]: time="2025-05-10T00:45:14.671823662Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:14.672093 env[1215]: time="2025-05-10T00:45:14.671875703Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:14.672093 env[1215]: time="2025-05-10T00:45:14.671894057Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:14.672648 env[1215]: time="2025-05-10T00:45:14.672548292Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c280922b5ae3c6c346bb974f9f7e4611101cbbb50660ed83a2e158d40bfe095d pid=2251 runtime=io.containerd.runc.v2 May 10 00:45:14.682336 kernel: audit: type=1400 audit(1746837914.507:791): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.705986 kernel: audit: type=1400 audit(1746837914.507:792): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.708660 systemd[1]: Started cri-containerd-c280922b5ae3c6c346bb974f9f7e4611101cbbb50660ed83a2e158d40bfe095d.scope. May 10 00:45:14.727247 kernel: audit: type=1400 audit(1746837914.528:793): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.528000 audit: BPF prog-id=106 op=LOAD May 10 00:45:14.530000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2212 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565346434376666373637656634313963663566323338373832346439 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2212 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565346434376666373637656634313963663566323338373832346439 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.530000 audit: BPF prog-id=107 op=LOAD May 10 00:45:14.530000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0003c2a30 items=0 ppid=2212 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565346434376666373637656634313963663566323338373832346439 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.552000 audit: BPF prog-id=108 op=LOAD May 10 00:45:14.552000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c0003c2a78 items=0 ppid=2212 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565346434376666373637656634313963663566323338373832346439 May 10 00:45:14.574000 audit: BPF prog-id=108 op=UNLOAD May 10 00:45:14.574000 audit: BPF prog-id=107 op=UNLOAD May 10 00:45:14.574000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { perfmon } for pid=2222 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit[2222]: AVC avc: denied { bpf } for pid=2222 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.574000 audit: BPF prog-id=109 op=LOAD May 10 00:45:14.574000 audit[2222]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c0003c2e88 items=0 ppid=2212 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.574000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565346434376666373637656634313963663566323338373832346439 May 10 00:45:14.741947 env[1215]: time="2025-05-10T00:45:14.741769706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hjfkn,Uid:9e4630ec-1b3b-4384-ad33-3c1eb67500ef,Namespace:kube-system,Attempt:0,} returns sandbox id \"ee4d47ff767ef419cf5f2387824d910b22d369b0ecdbe3f13598b064f9948e7d\"" May 10 00:45:14.749867 env[1215]: time="2025-05-10T00:45:14.747319120Z" level=info msg="CreateContainer within sandbox \"ee4d47ff767ef419cf5f2387824d910b22d369b0ecdbe3f13598b064f9948e7d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 00:45:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.772000 audit: BPF prog-id=110 op=LOAD May 10 00:45:14.774591 env[1215]: time="2025-05-10T00:45:14.772338323Z" level=info msg="CreateContainer within sandbox \"ee4d47ff767ef419cf5f2387824d910b22d369b0ecdbe3f13598b064f9948e7d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"214e759e594636664b57bee4120f62bcf63b198c579927d9b213727b9ea6ef6a\"" May 10 00:45:14.774591 env[1215]: time="2025-05-10T00:45:14.773846158Z" level=info msg="StartContainer for \"214e759e594636664b57bee4120f62bcf63b198c579927d9b213727b9ea6ef6a\"" May 10 00:45:14.775000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.775000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2251 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383039323262356165336336633334366262393734663966376534 May 10 00:45:14.775000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.775000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2251 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383039323262356165336336633334366262393734663966376534 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.776000 audit: BPF prog-id=111 op=LOAD May 10 00:45:14.776000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002419e0 items=0 ppid=2251 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383039323262356165336336633334366262393734663966376534 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.777000 audit: BPF prog-id=112 op=LOAD May 10 00:45:14.777000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000241a28 items=0 ppid=2251 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383039323262356165336336633334366262393734663966376534 May 10 00:45:14.781000 audit: BPF prog-id=112 op=UNLOAD May 10 00:45:14.781000 audit: BPF prog-id=111 op=UNLOAD May 10 00:45:14.781000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { perfmon } for pid=2259 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit[2259]: AVC avc: denied { bpf } for pid=2259 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.781000 audit: BPF prog-id=113 op=LOAD May 10 00:45:14.781000 audit[2259]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000241e38 items=0 ppid=2251 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6332383039323262356165336336633334366262393734663966376534 May 10 00:45:14.810590 systemd[1]: Started cri-containerd-214e759e594636664b57bee4120f62bcf63b198c579927d9b213727b9ea6ef6a.scope. May 10 00:45:14.856000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f92d8249298 items=0 ppid=2212 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346537353965353934363336363634623537626565343132306636 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.857760 env[1215]: time="2025-05-10T00:45:14.857693135Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-dk9r5,Uid:fe29c4a0-97f1-4e99-8165-55a084e45d9e,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"c280922b5ae3c6c346bb974f9f7e4611101cbbb50660ed83a2e158d40bfe095d\"" May 10 00:45:14.856000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.856000 audit: BPF prog-id=114 op=LOAD May 10 00:45:14.856000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000215288 items=0 ppid=2212 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.856000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346537353965353934363336363634623537626565343132306636 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.858000 audit: BPF prog-id=115 op=LOAD May 10 00:45:14.858000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0002152d8 items=0 ppid=2212 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346537353965353934363336363634623537626565343132306636 May 10 00:45:14.859000 audit: BPF prog-id=115 op=UNLOAD May 10 00:45:14.859000 audit: BPF prog-id=114 op=UNLOAD May 10 00:45:14.859000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { perfmon } for pid=2290 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit[2290]: AVC avc: denied { bpf } for pid=2290 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:14.859000 audit: BPF prog-id=116 op=LOAD May 10 00:45:14.859000 audit[2290]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000215368 items=0 ppid=2212 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3231346537353965353934363336363634623537626565343132306636 May 10 00:45:14.867477 env[1215]: time="2025-05-10T00:45:14.862491406Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 00:45:14.900512 env[1215]: time="2025-05-10T00:45:14.891600814Z" level=info msg="StartContainer for \"214e759e594636664b57bee4120f62bcf63b198c579927d9b213727b9ea6ef6a\" returns successfully" May 10 00:45:14.991000 audit[2351]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:14.991000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffee58ed370 a2=0 a3=7ffee58ed35c items=0 ppid=2301 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:45:14.995000 audit[2353]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:14.995000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcc617c010 a2=0 a3=7ffcc617bffc items=0 ppid=2301 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.995000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 00:45:14.997000 audit[2354]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:14.997000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca6705ea0 a2=0 a3=7ffca6705e8c items=0 ppid=2301 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.997000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:45:14.998000 audit[2352]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:14.998000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfd083b30 a2=0 a3=7ffdfd083b1c items=0 ppid=2301 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:14.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 00:45:15.001000 audit[2355]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.001000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffee5cb850 a2=0 a3=7fffee5cb83c items=0 ppid=2301 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.001000 audit[2356]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.001000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc266ee3c0 a2=0 a3=e024a1875ea2a102 items=0 ppid=2301 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:45:15.001000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 00:45:15.095000 audit[2357]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2357 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.095000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd5418d3b0 a2=0 a3=7ffd5418d39c items=0 ppid=2301 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:45:15.099000 audit[2359]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.099000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff801c89b0 a2=0 a3=7fff801c899c items=0 ppid=2301 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.099000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 00:45:15.105000 audit[2362]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.105000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff125afc50 a2=0 a3=7fff125afc3c items=0 ppid=2301 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 00:45:15.107000 audit[2363]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.107000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcfea295e0 a2=0 a3=7ffcfea295cc items=0 ppid=2301 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:45:15.111000 audit[2365]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.111000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd7a236390 a2=0 a3=7ffd7a23637c items=0 ppid=2301 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:45:15.113000 audit[2366]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.113000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd00ef75c0 a2=0 a3=7ffd00ef75ac items=0 ppid=2301 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:45:15.117000 audit[2368]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2368 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.117000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff07324520 a2=0 a3=7fff0732450c items=0 ppid=2301 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:45:15.123000 audit[2371]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2371 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.123000 audit[2371]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffd1043aa0 a2=0 a3=7fffd1043a8c items=0 ppid=2301 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 00:45:15.125000 audit[2372]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2372 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.125000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc8b4f22c0 a2=0 a3=7ffc8b4f22ac items=0 ppid=2301 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:45:15.129000 audit[2374]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2374 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.129000 audit[2374]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff330a08a0 a2=0 a3=7fff330a088c items=0 ppid=2301 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.129000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:45:15.131000 audit[2375]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2375 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.131000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffefd56ae70 a2=0 a3=7ffefd56ae5c items=0 ppid=2301 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.131000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:45:15.136000 audit[2377]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.136000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd36b09c40 a2=0 a3=7ffd36b09c2c items=0 ppid=2301 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.136000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:45:15.142000 audit[2380]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.142000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc3a45d470 a2=0 a3=7ffc3a45d45c items=0 ppid=2301 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.142000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:45:15.148000 audit[2383]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2383 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.148000 audit[2383]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffef72b7f20 a2=0 a3=7ffef72b7f0c items=0 ppid=2301 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.148000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:45:15.150000 audit[2384]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.150000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcc72eda30 a2=0 a3=7ffcc72eda1c items=0 ppid=2301 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:45:15.154000 audit[2386]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.154000 audit[2386]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc54f63b00 a2=0 a3=7ffc54f63aec items=0 ppid=2301 pid=2386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.154000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:45:15.161000 audit[2389]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.161000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd83a27de0 a2=0 a3=7ffd83a27dcc items=0 ppid=2301 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.161000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:45:15.163000 audit[2390]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.163000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffec07f65c0 a2=0 a3=7ffec07f65ac items=0 ppid=2301 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.163000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:45:15.168000 audit[2392]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 00:45:15.168000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffded96d130 a2=0 a3=7ffded96d11c items=0 ppid=2301 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:45:15.202000 audit[2398]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:15.202000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffb4c126b0 a2=0 a3=7fffb4c1269c items=0 ppid=2301 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.202000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:15.215000 audit[2398]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2398 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:15.215000 audit[2398]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fffb4c126b0 a2=0 a3=7fffb4c1269c items=0 ppid=2301 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.215000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:15.217000 audit[2403]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2403 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.217000 audit[2403]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff21302b40 a2=0 a3=7fff21302b2c items=0 ppid=2301 pid=2403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.217000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 00:45:15.222000 audit[2405]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2405 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.222000 audit[2405]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff22a602c0 a2=0 a3=7fff22a602ac items=0 ppid=2301 pid=2405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.222000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 00:45:15.228000 audit[2408]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2408 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.228000 audit[2408]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe2a427fe0 a2=0 a3=7ffe2a427fcc items=0 ppid=2301 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.228000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 00:45:15.230000 audit[2409]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2409 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.230000 audit[2409]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe087fede0 a2=0 a3=7ffe087fedcc items=0 ppid=2301 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 00:45:15.233000 audit[2411]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.233000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce3f01ea0 a2=0 a3=7ffce3f01e8c items=0 ppid=2301 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 00:45:15.235000 audit[2412]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2412 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.235000 audit[2412]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffab7d87d0 a2=0 a3=7fffab7d87bc items=0 ppid=2301 pid=2412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.235000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 00:45:15.239000 audit[2414]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2414 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.239000 audit[2414]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd17f83100 a2=0 a3=7ffd17f830ec items=0 ppid=2301 pid=2414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.239000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 00:45:15.245000 audit[2417]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2417 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.245000 audit[2417]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd607845f0 a2=0 a3=7ffd607845dc items=0 ppid=2301 pid=2417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.245000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 00:45:15.248000 audit[2418]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2418 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.248000 audit[2418]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb6249980 a2=0 a3=7ffeb624996c items=0 ppid=2301 pid=2418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.248000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 00:45:15.252000 audit[2420]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2420 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.252000 audit[2420]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff7fbbc6d0 a2=0 a3=7fff7fbbc6bc items=0 ppid=2301 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.252000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 00:45:15.254000 audit[2421]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2421 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.254000 audit[2421]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0f5ee000 a2=0 a3=7ffd0f5edfec items=0 ppid=2301 pid=2421 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.254000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 00:45:15.258000 audit[2423]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2423 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.258000 audit[2423]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfed5feb0 a2=0 a3=7ffdfed5fe9c items=0 ppid=2301 pid=2423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.258000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 00:45:15.264000 audit[2426]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2426 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.264000 audit[2426]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe6a391d20 a2=0 a3=7ffe6a391d0c items=0 ppid=2301 pid=2426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.264000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 00:45:15.270000 audit[2429]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2429 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.270000 audit[2429]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdc1d73070 a2=0 a3=7ffdc1d7305c items=0 ppid=2301 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 00:45:15.273000 audit[2430]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2430 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.273000 audit[2430]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe2850e080 a2=0 a3=7ffe2850e06c items=0 ppid=2301 pid=2430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.273000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 00:45:15.277000 audit[2432]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2432 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.277000 audit[2432]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffdc19c7af0 a2=0 a3=7ffdc19c7adc items=0 ppid=2301 pid=2432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.277000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:45:15.287000 audit[2436]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2436 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.287000 audit[2436]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc22377730 a2=0 a3=7ffc2237771c items=0 ppid=2301 pid=2436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.287000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 00:45:15.289000 audit[2437]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2437 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.289000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe381863f0 a2=0 a3=7ffe381863dc items=0 ppid=2301 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.289000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 00:45:15.300000 audit[2439]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2439 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.300000 audit[2439]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd1fa70dc0 a2=0 a3=7ffd1fa70dac items=0 ppid=2301 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.300000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 00:45:15.304632 systemd[1]: run-containerd-runc-k8s.io-ee4d47ff767ef419cf5f2387824d910b22d369b0ecdbe3f13598b064f9948e7d-runc.ZfJTjp.mount: Deactivated successfully. May 10 00:45:15.306000 audit[2440]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2440 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.306000 audit[2440]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3946b930 a2=0 a3=7fff3946b91c items=0 ppid=2301 pid=2440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.306000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 00:45:15.314000 audit[2442]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2442 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.314000 audit[2442]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd116540f0 a2=0 a3=7ffd116540dc items=0 ppid=2301 pid=2442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:45:15.321000 audit[2445]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2445 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 00:45:15.321000 audit[2445]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff0b574da0 a2=0 a3=7fff0b574d8c items=0 ppid=2301 pid=2445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 00:45:15.325000 audit[2447]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:45:15.325000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffc3f8af0f0 a2=0 a3=7ffc3f8af0dc items=0 ppid=2301 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.325000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:15.326000 audit[2447]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2447 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 00:45:15.326000 audit[2447]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffc3f8af0f0 a2=0 a3=7ffc3f8af0dc items=0 ppid=2301 pid=2447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:15.326000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:15.915431 kubelet[2110]: I0510 00:45:15.915330 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-hjfkn" podStartSLOduration=1.9153010369999999 podStartE2EDuration="1.915301037s" podCreationTimestamp="2025-05-10 00:45:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:15.912290286 +0000 UTC m=+17.297363944" watchObservedRunningTime="2025-05-10 00:45:15.915301037 +0000 UTC m=+17.300374695" May 10 00:45:15.954829 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount217932330.mount: Deactivated successfully. May 10 00:45:16.813623 env[1215]: time="2025-05-10T00:45:16.813542663Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:16.816794 env[1215]: time="2025-05-10T00:45:16.816738582Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:16.822050 env[1215]: time="2025-05-10T00:45:16.820759962Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:16.824834 env[1215]: time="2025-05-10T00:45:16.824765202Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:16.825757 env[1215]: time="2025-05-10T00:45:16.825701197Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 00:45:16.830256 env[1215]: time="2025-05-10T00:45:16.830172775Z" level=info msg="CreateContainer within sandbox \"c280922b5ae3c6c346bb974f9f7e4611101cbbb50660ed83a2e158d40bfe095d\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 00:45:16.851719 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3452254880.mount: Deactivated successfully. May 10 00:45:16.863709 env[1215]: time="2025-05-10T00:45:16.863645907Z" level=info msg="CreateContainer within sandbox \"c280922b5ae3c6c346bb974f9f7e4611101cbbb50660ed83a2e158d40bfe095d\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"756a63048a7e478919360f63b827aa00437b8400a574e6828e6385653e8cbfb0\"" May 10 00:45:16.865231 env[1215]: time="2025-05-10T00:45:16.864949764Z" level=info msg="StartContainer for \"756a63048a7e478919360f63b827aa00437b8400a574e6828e6385653e8cbfb0\"" May 10 00:45:16.904448 systemd[1]: Started cri-containerd-756a63048a7e478919360f63b827aa00437b8400a574e6828e6385653e8cbfb0.scope. May 10 00:45:16.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.933000 audit: BPF prog-id=117 op=LOAD May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2251 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:16.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735366136333034386137653437383931393336306636336238323761 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2251 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:16.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735366136333034386137653437383931393336306636336238323761 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit: BPF prog-id=118 op=LOAD May 10 00:45:16.934000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002f3ef0 items=0 ppid=2251 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:16.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735366136333034386137653437383931393336306636336238323761 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit: BPF prog-id=119 op=LOAD May 10 00:45:16.934000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002f3f38 items=0 ppid=2251 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:16.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735366136333034386137653437383931393336306636336238323761 May 10 00:45:16.934000 audit: BPF prog-id=119 op=UNLOAD May 10 00:45:16.934000 audit: BPF prog-id=118 op=UNLOAD May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { perfmon } for pid=2455 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit[2455]: AVC avc: denied { bpf } for pid=2455 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:16.934000 audit: BPF prog-id=120 op=LOAD May 10 00:45:16.934000 audit[2455]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003b8348 items=0 ppid=2251 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:16.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3735366136333034386137653437383931393336306636336238323761 May 10 00:45:16.959409 env[1215]: time="2025-05-10T00:45:16.959352217Z" level=info msg="StartContainer for \"756a63048a7e478919360f63b827aa00437b8400a574e6828e6385653e8cbfb0\" returns successfully" May 10 00:45:18.816433 kubelet[2110]: I0510 00:45:18.816356 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-dk9r5" podStartSLOduration=2.849885257 podStartE2EDuration="4.816301628s" podCreationTimestamp="2025-05-10 00:45:14 +0000 UTC" firstStartedPulling="2025-05-10 00:45:14.861093057 +0000 UTC m=+16.246166689" lastFinishedPulling="2025-05-10 00:45:16.827509423 +0000 UTC m=+18.212583060" observedRunningTime="2025-05-10 00:45:17.918066421 +0000 UTC m=+19.303140080" watchObservedRunningTime="2025-05-10 00:45:18.816301628 +0000 UTC m=+20.201375285" May 10 00:45:20.155270 kernel: kauditd_printk_skb: 357 callbacks suppressed May 10 00:45:20.155459 kernel: audit: type=1325 audit(1746837920.148:895): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:20.148000 audit[2487]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:20.148000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdb4e9a640 a2=0 a3=7ffdb4e9a62c items=0 ppid=2301 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.204313 kernel: audit: type=1300 audit(1746837920.148:895): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdb4e9a640 a2=0 a3=7ffdb4e9a62c items=0 ppid=2301 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.204517 kernel: audit: type=1327 audit(1746837920.148:895): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:20.148000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:20.172000 audit[2487]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:20.236255 kernel: audit: type=1325 audit(1746837920.172:896): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:20.236432 kernel: audit: type=1300 audit(1746837920.172:896): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb4e9a640 a2=0 a3=0 items=0 ppid=2301 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.172000 audit[2487]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdb4e9a640 a2=0 a3=0 items=0 ppid=2301 pid=2487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.284045 kernel: audit: type=1327 audit(1746837920.172:896): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:20.172000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:20.331928 kubelet[2110]: I0510 00:45:20.331871 2110 topology_manager.go:215] "Topology Admit Handler" podUID="cef0c2fe-b594-4cfb-b132-a18745d9c854" podNamespace="calico-system" podName="calico-typha-75794b44b7-gbzmc" May 10 00:45:20.331000 audit[2489]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:20.349750 kernel: audit: type=1325 audit(1746837920.331:897): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:20.331000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc9862360 a2=0 a3=7ffcc986234c items=0 ppid=2301 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.384271 kernel: audit: type=1300 audit(1746837920.331:897): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcc9862360 a2=0 a3=7ffcc986234c items=0 ppid=2301 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.386251 kubelet[2110]: W0510 00:45:20.386176 2110 reflector.go:547] object-"calico-system"/"typha-certs": failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' and this object May 10 00:45:20.388085 kubelet[2110]: E0510 00:45:20.387511 2110 reflector.go:150] object-"calico-system"/"typha-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "typha-certs" is forbidden: User "system:node:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' and this object May 10 00:45:20.389969 systemd[1]: Created slice kubepods-besteffort-podcef0c2fe_b594_4cfb_b132_a18745d9c854.slice. May 10 00:45:20.331000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:20.410321 kernel: audit: type=1327 audit(1746837920.331:897): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:20.413000 audit[2489]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:20.413000 audit[2489]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcc9862360 a2=0 a3=0 items=0 ppid=2301 pid=2489 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:20.430344 kernel: audit: type=1325 audit(1746837920.413:898): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2489 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:20.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:20.512560 kubelet[2110]: I0510 00:45:20.512515 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cef0c2fe-b594-4cfb-b132-a18745d9c854-typha-certs\") pod \"calico-typha-75794b44b7-gbzmc\" (UID: \"cef0c2fe-b594-4cfb-b132-a18745d9c854\") " pod="calico-system/calico-typha-75794b44b7-gbzmc" May 10 00:45:20.512855 kubelet[2110]: I0510 00:45:20.512820 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jt88q\" (UniqueName: \"kubernetes.io/projected/cef0c2fe-b594-4cfb-b132-a18745d9c854-kube-api-access-jt88q\") pod \"calico-typha-75794b44b7-gbzmc\" (UID: \"cef0c2fe-b594-4cfb-b132-a18745d9c854\") " pod="calico-system/calico-typha-75794b44b7-gbzmc" May 10 00:45:20.513131 kubelet[2110]: I0510 00:45:20.513091 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cef0c2fe-b594-4cfb-b132-a18745d9c854-tigera-ca-bundle\") pod \"calico-typha-75794b44b7-gbzmc\" (UID: \"cef0c2fe-b594-4cfb-b132-a18745d9c854\") " pod="calico-system/calico-typha-75794b44b7-gbzmc" May 10 00:45:20.602737 kubelet[2110]: I0510 00:45:20.602686 2110 topology_manager.go:215] "Topology Admit Handler" podUID="ecb691eb-5a86-4e73-8f0e-04fbb8634b89" podNamespace="calico-system" podName="calico-node-7tgtz" May 10 00:45:20.611808 systemd[1]: Created slice kubepods-besteffort-podecb691eb_5a86_4e73_8f0e_04fbb8634b89.slice. May 10 00:45:20.627428 kubelet[2110]: W0510 00:45:20.627384 2110 reflector.go:547] object-"calico-system"/"node-certs": failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' and this object May 10 00:45:20.627732 kubelet[2110]: E0510 00:45:20.627702 2110 reflector.go:150] object-"calico-system"/"node-certs": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets "node-certs" is forbidden: User "system:node:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" cannot list resource "secrets" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' and this object May 10 00:45:20.628966 kubelet[2110]: W0510 00:45:20.628932 2110 reflector.go:547] object-"calico-system"/"cni-config": failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' and this object May 10 00:45:20.629209 kubelet[2110]: E0510 00:45:20.629187 2110 reflector.go:150] object-"calico-system"/"cni-config": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "cni-config" is forbidden: User "system:node:ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" cannot list resource "configmaps" in API group "" in the namespace "calico-system": no relationship found between node 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' and this object May 10 00:45:20.714864 kubelet[2110]: I0510 00:45:20.714814 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-policysync\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.715196 kubelet[2110]: I0510 00:45:20.715169 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-node-certs\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.715374 kubelet[2110]: I0510 00:45:20.715350 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-var-run-calico\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.715507 kubelet[2110]: I0510 00:45:20.715484 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-net-dir\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.715720 kubelet[2110]: I0510 00:45:20.715698 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-bin-dir\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.715857 kubelet[2110]: I0510 00:45:20.715832 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-flexvol-driver-host\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.716008 kubelet[2110]: I0510 00:45:20.715960 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-tigera-ca-bundle\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.716176 kubelet[2110]: I0510 00:45:20.716153 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n45jn\" (UniqueName: \"kubernetes.io/projected/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-kube-api-access-n45jn\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.716329 kubelet[2110]: I0510 00:45:20.716306 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-lib-modules\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.716484 kubelet[2110]: I0510 00:45:20.716454 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-xtables-lock\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.716682 kubelet[2110]: I0510 00:45:20.716660 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-var-lib-calico\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.716831 kubelet[2110]: I0510 00:45:20.716788 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-log-dir\") pod \"calico-node-7tgtz\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " pod="calico-system/calico-node-7tgtz" May 10 00:45:20.820091 kubelet[2110]: E0510 00:45:20.820051 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.820380 kubelet[2110]: W0510 00:45:20.820351 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.820574 kubelet[2110]: E0510 00:45:20.820549 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.844595 kubelet[2110]: E0510 00:45:20.844565 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.844798 kubelet[2110]: W0510 00:45:20.844774 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.844951 kubelet[2110]: E0510 00:45:20.844929 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.848141 kubelet[2110]: I0510 00:45:20.848096 2110 topology_manager.go:215] "Topology Admit Handler" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" podNamespace="calico-system" podName="csi-node-driver-nv9sq" May 10 00:45:20.848885 kubelet[2110]: E0510 00:45:20.848845 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:20.916871 kubelet[2110]: E0510 00:45:20.916822 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.916871 kubelet[2110]: W0510 00:45:20.916861 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.917165 kubelet[2110]: E0510 00:45:20.916892 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.917273 kubelet[2110]: E0510 00:45:20.917201 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.917273 kubelet[2110]: W0510 00:45:20.917233 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.917273 kubelet[2110]: E0510 00:45:20.917251 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.917607 kubelet[2110]: E0510 00:45:20.917581 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.917607 kubelet[2110]: W0510 00:45:20.917604 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.917756 kubelet[2110]: E0510 00:45:20.917623 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.917929 kubelet[2110]: E0510 00:45:20.917904 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.918011 kubelet[2110]: W0510 00:45:20.917929 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.918011 kubelet[2110]: E0510 00:45:20.917945 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.918311 kubelet[2110]: E0510 00:45:20.918286 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.918311 kubelet[2110]: W0510 00:45:20.918309 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.918470 kubelet[2110]: E0510 00:45:20.918326 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.918654 kubelet[2110]: E0510 00:45:20.918630 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.918731 kubelet[2110]: W0510 00:45:20.918653 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.918731 kubelet[2110]: E0510 00:45:20.918671 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.918967 kubelet[2110]: E0510 00:45:20.918943 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.918967 kubelet[2110]: W0510 00:45:20.918965 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.919095 kubelet[2110]: E0510 00:45:20.918982 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.919309 kubelet[2110]: E0510 00:45:20.919286 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.919309 kubelet[2110]: W0510 00:45:20.919308 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.919443 kubelet[2110]: E0510 00:45:20.919326 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.919681 kubelet[2110]: E0510 00:45:20.919658 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.919681 kubelet[2110]: W0510 00:45:20.919679 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.919840 kubelet[2110]: E0510 00:45:20.919697 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.919990 kubelet[2110]: E0510 00:45:20.919967 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.920064 kubelet[2110]: W0510 00:45:20.919990 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.920064 kubelet[2110]: E0510 00:45:20.920007 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.920352 kubelet[2110]: E0510 00:45:20.920328 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.920437 kubelet[2110]: W0510 00:45:20.920349 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.920437 kubelet[2110]: E0510 00:45:20.920375 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.920689 kubelet[2110]: E0510 00:45:20.920666 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.920689 kubelet[2110]: W0510 00:45:20.920686 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.920850 kubelet[2110]: E0510 00:45:20.920704 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.921076 kubelet[2110]: E0510 00:45:20.921051 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.921076 kubelet[2110]: W0510 00:45:20.921074 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.921245 kubelet[2110]: E0510 00:45:20.921092 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.921421 kubelet[2110]: E0510 00:45:20.921399 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.921421 kubelet[2110]: W0510 00:45:20.921419 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.921546 kubelet[2110]: E0510 00:45:20.921437 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.921723 kubelet[2110]: E0510 00:45:20.921700 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.921723 kubelet[2110]: W0510 00:45:20.921722 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.921849 kubelet[2110]: E0510 00:45:20.921738 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.922024 kubelet[2110]: E0510 00:45:20.922002 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.922024 kubelet[2110]: W0510 00:45:20.922023 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.922158 kubelet[2110]: E0510 00:45:20.922040 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.922411 kubelet[2110]: E0510 00:45:20.922389 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.922411 kubelet[2110]: W0510 00:45:20.922409 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.922545 kubelet[2110]: E0510 00:45:20.922426 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.922715 kubelet[2110]: E0510 00:45:20.922693 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.922788 kubelet[2110]: W0510 00:45:20.922716 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.922788 kubelet[2110]: E0510 00:45:20.922732 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.923049 kubelet[2110]: E0510 00:45:20.923027 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.923049 kubelet[2110]: W0510 00:45:20.923048 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.923202 kubelet[2110]: E0510 00:45:20.923065 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.925453 kubelet[2110]: E0510 00:45:20.925422 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.925453 kubelet[2110]: W0510 00:45:20.925448 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.925600 kubelet[2110]: E0510 00:45:20.925469 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.925954 kubelet[2110]: E0510 00:45:20.925925 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.925954 kubelet[2110]: W0510 00:45:20.925951 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.926100 kubelet[2110]: E0510 00:45:20.925971 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.926100 kubelet[2110]: I0510 00:45:20.926013 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/59ed8057-dfcb-47c2-9e56-afc23d0a505f-kubelet-dir\") pod \"csi-node-driver-nv9sq\" (UID: \"59ed8057-dfcb-47c2-9e56-afc23d0a505f\") " pod="calico-system/csi-node-driver-nv9sq" May 10 00:45:20.926449 kubelet[2110]: E0510 00:45:20.926422 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.926449 kubelet[2110]: W0510 00:45:20.926448 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.926603 kubelet[2110]: E0510 00:45:20.926472 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.926834 kubelet[2110]: E0510 00:45:20.926809 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.926834 kubelet[2110]: W0510 00:45:20.926831 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.926989 kubelet[2110]: E0510 00:45:20.926854 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.927208 kubelet[2110]: E0510 00:45:20.927183 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.927337 kubelet[2110]: W0510 00:45:20.927207 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.927337 kubelet[2110]: E0510 00:45:20.927262 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.927337 kubelet[2110]: I0510 00:45:20.927293 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xpwvf\" (UniqueName: \"kubernetes.io/projected/59ed8057-dfcb-47c2-9e56-afc23d0a505f-kube-api-access-xpwvf\") pod \"csi-node-driver-nv9sq\" (UID: \"59ed8057-dfcb-47c2-9e56-afc23d0a505f\") " pod="calico-system/csi-node-driver-nv9sq" May 10 00:45:20.927662 kubelet[2110]: E0510 00:45:20.927635 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.927662 kubelet[2110]: W0510 00:45:20.927660 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.927872 kubelet[2110]: E0510 00:45:20.927842 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.927948 kubelet[2110]: I0510 00:45:20.927890 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/59ed8057-dfcb-47c2-9e56-afc23d0a505f-socket-dir\") pod \"csi-node-driver-nv9sq\" (UID: \"59ed8057-dfcb-47c2-9e56-afc23d0a505f\") " pod="calico-system/csi-node-driver-nv9sq" May 10 00:45:20.928143 kubelet[2110]: E0510 00:45:20.928120 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.928143 kubelet[2110]: W0510 00:45:20.928141 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.928354 kubelet[2110]: E0510 00:45:20.928329 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.928576 kubelet[2110]: E0510 00:45:20.928554 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.928656 kubelet[2110]: W0510 00:45:20.928575 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.928656 kubelet[2110]: E0510 00:45:20.928599 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.928900 kubelet[2110]: E0510 00:45:20.928877 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.928900 kubelet[2110]: W0510 00:45:20.928899 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.929030 kubelet[2110]: E0510 00:45:20.928921 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.929030 kubelet[2110]: I0510 00:45:20.928952 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/59ed8057-dfcb-47c2-9e56-afc23d0a505f-registration-dir\") pod \"csi-node-driver-nv9sq\" (UID: \"59ed8057-dfcb-47c2-9e56-afc23d0a505f\") " pod="calico-system/csi-node-driver-nv9sq" May 10 00:45:20.929337 kubelet[2110]: E0510 00:45:20.929307 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.929337 kubelet[2110]: W0510 00:45:20.929335 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.929510 kubelet[2110]: E0510 00:45:20.929370 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.929668 kubelet[2110]: E0510 00:45:20.929644 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.929668 kubelet[2110]: W0510 00:45:20.929666 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.929816 kubelet[2110]: E0510 00:45:20.929712 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.930138 kubelet[2110]: E0510 00:45:20.930104 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.930138 kubelet[2110]: W0510 00:45:20.930126 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.930306 kubelet[2110]: E0510 00:45:20.930151 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.930539 kubelet[2110]: E0510 00:45:20.930512 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.930539 kubelet[2110]: W0510 00:45:20.930535 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.930696 kubelet[2110]: E0510 00:45:20.930553 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.930910 kubelet[2110]: E0510 00:45:20.930885 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.930910 kubelet[2110]: W0510 00:45:20.930908 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.931051 kubelet[2110]: E0510 00:45:20.930931 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.931051 kubelet[2110]: I0510 00:45:20.930972 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/59ed8057-dfcb-47c2-9e56-afc23d0a505f-varrun\") pod \"csi-node-driver-nv9sq\" (UID: \"59ed8057-dfcb-47c2-9e56-afc23d0a505f\") " pod="calico-system/csi-node-driver-nv9sq" May 10 00:45:20.931352 kubelet[2110]: E0510 00:45:20.931315 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.931439 kubelet[2110]: W0510 00:45:20.931359 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.931439 kubelet[2110]: E0510 00:45:20.931378 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.931732 kubelet[2110]: E0510 00:45:20.931709 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.931732 kubelet[2110]: W0510 00:45:20.931725 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.931881 kubelet[2110]: E0510 00:45:20.931744 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.932134 kubelet[2110]: E0510 00:45:20.932099 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.932134 kubelet[2110]: W0510 00:45:20.932130 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.932314 kubelet[2110]: E0510 00:45:20.932149 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:20.932562 kubelet[2110]: E0510 00:45:20.932527 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:20.932562 kubelet[2110]: W0510 00:45:20.932549 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:20.932724 kubelet[2110]: E0510 00:45:20.932568 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.032565 kubelet[2110]: E0510 00:45:21.032420 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.032565 kubelet[2110]: W0510 00:45:21.032452 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.032565 kubelet[2110]: E0510 00:45:21.032520 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.035410 kubelet[2110]: E0510 00:45:21.035371 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.035410 kubelet[2110]: W0510 00:45:21.035406 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.035659 kubelet[2110]: E0510 00:45:21.035443 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.035923 kubelet[2110]: E0510 00:45:21.035895 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.035923 kubelet[2110]: W0510 00:45:21.035922 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.036080 kubelet[2110]: E0510 00:45:21.036046 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.036368 kubelet[2110]: E0510 00:45:21.036331 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.036368 kubelet[2110]: W0510 00:45:21.036353 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.036536 kubelet[2110]: E0510 00:45:21.036486 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.036751 kubelet[2110]: E0510 00:45:21.036727 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.036751 kubelet[2110]: W0510 00:45:21.036749 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.036903 kubelet[2110]: E0510 00:45:21.036775 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.037129 kubelet[2110]: E0510 00:45:21.037092 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.037129 kubelet[2110]: W0510 00:45:21.037127 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.037300 kubelet[2110]: E0510 00:45:21.037152 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.037503 kubelet[2110]: E0510 00:45:21.037481 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.037503 kubelet[2110]: W0510 00:45:21.037503 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.037633 kubelet[2110]: E0510 00:45:21.037618 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.037867 kubelet[2110]: E0510 00:45:21.037843 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.037867 kubelet[2110]: W0510 00:45:21.037865 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.038013 kubelet[2110]: E0510 00:45:21.037986 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.040342 kubelet[2110]: E0510 00:45:21.040316 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.040540 kubelet[2110]: W0510 00:45:21.040518 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.041391 kubelet[2110]: E0510 00:45:21.041344 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.041646 kubelet[2110]: E0510 00:45:21.041626 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.041777 kubelet[2110]: W0510 00:45:21.041757 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.042060 kubelet[2110]: E0510 00:45:21.042040 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.042426 kubelet[2110]: E0510 00:45:21.042409 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.042637 kubelet[2110]: W0510 00:45:21.042613 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.042869 kubelet[2110]: E0510 00:45:21.042852 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.043234 kubelet[2110]: E0510 00:45:21.043201 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.043373 kubelet[2110]: W0510 00:45:21.043343 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.043746 kubelet[2110]: E0510 00:45:21.043726 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.044477 kubelet[2110]: E0510 00:45:21.044459 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.044690 kubelet[2110]: W0510 00:45:21.044630 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.045150 kubelet[2110]: E0510 00:45:21.045123 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.045765 kubelet[2110]: E0510 00:45:21.045738 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.045765 kubelet[2110]: W0510 00:45:21.045760 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.045949 kubelet[2110]: E0510 00:45:21.045904 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.046298 kubelet[2110]: E0510 00:45:21.046271 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.046298 kubelet[2110]: W0510 00:45:21.046290 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.046584 kubelet[2110]: E0510 00:45:21.046550 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.048481 kubelet[2110]: E0510 00:45:21.048450 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.048656 kubelet[2110]: W0510 00:45:21.048630 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.048838 kubelet[2110]: E0510 00:45:21.048816 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.049505 kubelet[2110]: E0510 00:45:21.049441 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.049653 kubelet[2110]: W0510 00:45:21.049621 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.049937 kubelet[2110]: E0510 00:45:21.049910 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.050141 kubelet[2110]: E0510 00:45:21.050122 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.050291 kubelet[2110]: W0510 00:45:21.050267 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.050642 kubelet[2110]: E0510 00:45:21.050615 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.050864 kubelet[2110]: E0510 00:45:21.050846 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.050989 kubelet[2110]: W0510 00:45:21.050968 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.051302 kubelet[2110]: E0510 00:45:21.051274 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.051526 kubelet[2110]: E0510 00:45:21.051509 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.051640 kubelet[2110]: W0510 00:45:21.051620 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.051915 kubelet[2110]: E0510 00:45:21.051890 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.052162 kubelet[2110]: E0510 00:45:21.052145 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.052422 kubelet[2110]: W0510 00:45:21.052399 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.052727 kubelet[2110]: E0510 00:45:21.052705 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.053107 kubelet[2110]: E0510 00:45:21.053088 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.053302 kubelet[2110]: W0510 00:45:21.053279 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.053557 kubelet[2110]: E0510 00:45:21.053537 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.053896 kubelet[2110]: E0510 00:45:21.053879 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.054020 kubelet[2110]: W0510 00:45:21.053999 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.054364 kubelet[2110]: E0510 00:45:21.054328 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.054753 kubelet[2110]: E0510 00:45:21.054734 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.054879 kubelet[2110]: W0510 00:45:21.054860 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.055007 kubelet[2110]: E0510 00:45:21.054987 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.055530 kubelet[2110]: E0510 00:45:21.055506 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.055623 kubelet[2110]: W0510 00:45:21.055530 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.055623 kubelet[2110]: E0510 00:45:21.055550 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.056259 kubelet[2110]: E0510 00:45:21.055912 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.056259 kubelet[2110]: W0510 00:45:21.055930 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.056259 kubelet[2110]: E0510 00:45:21.055948 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.056787 kubelet[2110]: E0510 00:45:21.056749 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.056787 kubelet[2110]: W0510 00:45:21.056769 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.056940 kubelet[2110]: E0510 00:45:21.056788 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.082147 kubelet[2110]: E0510 00:45:21.082113 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.082433 kubelet[2110]: W0510 00:45:21.082402 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.082621 kubelet[2110]: E0510 00:45:21.082598 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.152926 kubelet[2110]: E0510 00:45:21.152889 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.153160 kubelet[2110]: W0510 00:45:21.153134 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.153315 kubelet[2110]: E0510 00:45:21.153285 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.153810 kubelet[2110]: E0510 00:45:21.153781 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.153969 kubelet[2110]: W0510 00:45:21.153947 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.154118 kubelet[2110]: E0510 00:45:21.154097 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.255717 kubelet[2110]: E0510 00:45:21.255680 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.255973 kubelet[2110]: W0510 00:45:21.255944 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.256103 kubelet[2110]: E0510 00:45:21.256081 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.256643 kubelet[2110]: E0510 00:45:21.256620 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.256789 kubelet[2110]: W0510 00:45:21.256766 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.257007 kubelet[2110]: E0510 00:45:21.256985 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.358026 kubelet[2110]: E0510 00:45:21.357876 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.358026 kubelet[2110]: W0510 00:45:21.357909 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.358026 kubelet[2110]: E0510 00:45:21.357943 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.358748 kubelet[2110]: E0510 00:45:21.358389 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.358748 kubelet[2110]: W0510 00:45:21.358407 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.358748 kubelet[2110]: E0510 00:45:21.358431 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.454000 audit[2567]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2567 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:21.454000 audit[2567]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff8ffece30 a2=0 a3=7fff8ffece1c items=0 ppid=2301 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:21.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:21.459747 kubelet[2110]: E0510 00:45:21.459709 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.459747 kubelet[2110]: W0510 00:45:21.459740 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.459999 kubelet[2110]: E0510 00:45:21.459771 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.460342 kubelet[2110]: E0510 00:45:21.460317 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.460342 kubelet[2110]: W0510 00:45:21.460339 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.460509 kubelet[2110]: E0510 00:45:21.460362 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.461000 audit[2567]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2567 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:21.461000 audit[2567]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff8ffece30 a2=0 a3=0 items=0 ppid=2301 pid=2567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:21.461000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:21.561955 kubelet[2110]: E0510 00:45:21.561916 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.561955 kubelet[2110]: W0510 00:45:21.561947 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.562331 kubelet[2110]: E0510 00:45:21.561979 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.562434 kubelet[2110]: E0510 00:45:21.562372 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.562434 kubelet[2110]: W0510 00:45:21.562390 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.562434 kubelet[2110]: E0510 00:45:21.562413 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.619123 kubelet[2110]: E0510 00:45:21.618986 2110 secret.go:194] Couldn't get secret calico-system/typha-certs: failed to sync secret cache: timed out waiting for the condition May 10 00:45:21.619123 kubelet[2110]: E0510 00:45:21.619111 2110 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/cef0c2fe-b594-4cfb-b132-a18745d9c854-typha-certs podName:cef0c2fe-b594-4cfb-b132-a18745d9c854 nodeName:}" failed. No retries permitted until 2025-05-10 00:45:22.11908252 +0000 UTC m=+23.504156151 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "typha-certs" (UniqueName: "kubernetes.io/secret/cef0c2fe-b594-4cfb-b132-a18745d9c854-typha-certs") pod "calico-typha-75794b44b7-gbzmc" (UID: "cef0c2fe-b594-4cfb-b132-a18745d9c854") : failed to sync secret cache: timed out waiting for the condition May 10 00:45:21.663293 kubelet[2110]: E0510 00:45:21.663251 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.663293 kubelet[2110]: W0510 00:45:21.663285 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.663591 kubelet[2110]: E0510 00:45:21.663335 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.663728 kubelet[2110]: E0510 00:45:21.663705 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.663728 kubelet[2110]: W0510 00:45:21.663725 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.663859 kubelet[2110]: E0510 00:45:21.663747 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.765347 kubelet[2110]: E0510 00:45:21.765295 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.765347 kubelet[2110]: W0510 00:45:21.765330 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.765606 kubelet[2110]: E0510 00:45:21.765365 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.765782 kubelet[2110]: E0510 00:45:21.765756 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.765782 kubelet[2110]: W0510 00:45:21.765779 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.765945 kubelet[2110]: E0510 00:45:21.765802 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.819691 kubelet[2110]: E0510 00:45:21.819640 2110 secret.go:194] Couldn't get secret calico-system/node-certs: failed to sync secret cache: timed out waiting for the condition May 10 00:45:21.819894 kubelet[2110]: E0510 00:45:21.819750 2110 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-node-certs podName:ecb691eb-5a86-4e73-8f0e-04fbb8634b89 nodeName:}" failed. No retries permitted until 2025-05-10 00:45:22.31972384 +0000 UTC m=+23.704797488 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "node-certs" (UniqueName: "kubernetes.io/secret/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-node-certs") pod "calico-node-7tgtz" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89") : failed to sync secret cache: timed out waiting for the condition May 10 00:45:21.867403 kubelet[2110]: E0510 00:45:21.867346 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.867403 kubelet[2110]: W0510 00:45:21.867386 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.867676 kubelet[2110]: E0510 00:45:21.867426 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.867843 kubelet[2110]: E0510 00:45:21.867819 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.867843 kubelet[2110]: W0510 00:45:21.867842 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.868006 kubelet[2110]: E0510 00:45:21.867866 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.968588 kubelet[2110]: E0510 00:45:21.968548 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.968588 kubelet[2110]: W0510 00:45:21.968580 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.968890 kubelet[2110]: E0510 00:45:21.968613 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:21.968989 kubelet[2110]: E0510 00:45:21.968961 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:21.968989 kubelet[2110]: W0510 00:45:21.968987 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:21.969170 kubelet[2110]: E0510 00:45:21.969010 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.070329 kubelet[2110]: E0510 00:45:22.070272 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.070329 kubelet[2110]: W0510 00:45:22.070310 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.070592 kubelet[2110]: E0510 00:45:22.070344 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.070721 kubelet[2110]: E0510 00:45:22.070693 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.070721 kubelet[2110]: W0510 00:45:22.070718 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.070872 kubelet[2110]: E0510 00:45:22.070741 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.172417 kubelet[2110]: E0510 00:45:22.172357 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.172417 kubelet[2110]: W0510 00:45:22.172390 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.172417 kubelet[2110]: E0510 00:45:22.172421 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.172821 kubelet[2110]: E0510 00:45:22.172796 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.172821 kubelet[2110]: W0510 00:45:22.172825 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.173097 kubelet[2110]: E0510 00:45:22.172847 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.173283 kubelet[2110]: E0510 00:45:22.173245 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.173283 kubelet[2110]: W0510 00:45:22.173272 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.173430 kubelet[2110]: E0510 00:45:22.173292 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.173621 kubelet[2110]: E0510 00:45:22.173582 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.173621 kubelet[2110]: W0510 00:45:22.173613 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.173798 kubelet[2110]: E0510 00:45:22.173631 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.173921 kubelet[2110]: E0510 00:45:22.173898 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.173921 kubelet[2110]: W0510 00:45:22.173920 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.174072 kubelet[2110]: E0510 00:45:22.173936 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.174338 kubelet[2110]: E0510 00:45:22.174293 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.174338 kubelet[2110]: W0510 00:45:22.174313 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.174338 kubelet[2110]: E0510 00:45:22.174333 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.186577 kubelet[2110]: E0510 00:45:22.186534 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.186577 kubelet[2110]: W0510 00:45:22.186564 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.186779 kubelet[2110]: E0510 00:45:22.186595 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.198549 env[1215]: time="2025-05-10T00:45:22.198491242Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-75794b44b7-gbzmc,Uid:cef0c2fe-b594-4cfb-b132-a18745d9c854,Namespace:calico-system,Attempt:0,}" May 10 00:45:22.234793 env[1215]: time="2025-05-10T00:45:22.233049071Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:22.234793 env[1215]: time="2025-05-10T00:45:22.233107991Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:22.234793 env[1215]: time="2025-05-10T00:45:22.233126766Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:22.235474 env[1215]: time="2025-05-10T00:45:22.235388489Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792 pid=2598 runtime=io.containerd.runc.v2 May 10 00:45:22.274664 kubelet[2110]: E0510 00:45:22.274539 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.274664 kubelet[2110]: W0510 00:45:22.274566 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.274664 kubelet[2110]: E0510 00:45:22.274595 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.282554 systemd[1]: Started cri-containerd-94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792.scope. May 10 00:45:22.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.311000 audit: BPF prog-id=121 op=LOAD May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2598 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934613863353430336631303738393563373839373433613237653861 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2598 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934613863353430336631303738393563373839373433613237653861 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit: BPF prog-id=122 op=LOAD May 10 00:45:22.312000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000357ff0 items=0 ppid=2598 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934613863353430336631303738393563373839373433613237653861 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit: BPF prog-id=123 op=LOAD May 10 00:45:22.312000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d6038 items=0 ppid=2598 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934613863353430336631303738393563373839373433613237653861 May 10 00:45:22.312000 audit: BPF prog-id=123 op=UNLOAD May 10 00:45:22.312000 audit: BPF prog-id=122 op=UNLOAD May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.312000 audit: BPF prog-id=124 op=LOAD May 10 00:45:22.312000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d6448 items=0 ppid=2598 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.312000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934613863353430336631303738393563373839373433613237653861 May 10 00:45:22.354552 env[1215]: time="2025-05-10T00:45:22.354485774Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-75794b44b7-gbzmc,Uid:cef0c2fe-b594-4cfb-b132-a18745d9c854,Namespace:calico-system,Attempt:0,} returns sandbox id \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\"" May 10 00:45:22.357112 env[1215]: time="2025-05-10T00:45:22.357065902Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 00:45:22.375901 kubelet[2110]: E0510 00:45:22.375844 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.375901 kubelet[2110]: W0510 00:45:22.375898 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.376609 kubelet[2110]: E0510 00:45:22.375932 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.376609 kubelet[2110]: E0510 00:45:22.376542 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.376609 kubelet[2110]: W0510 00:45:22.376564 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.376609 kubelet[2110]: E0510 00:45:22.376588 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.376997 kubelet[2110]: E0510 00:45:22.376952 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.376997 kubelet[2110]: W0510 00:45:22.376986 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.377180 kubelet[2110]: E0510 00:45:22.377007 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.377412 kubelet[2110]: E0510 00:45:22.377377 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.377412 kubelet[2110]: W0510 00:45:22.377395 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.377559 kubelet[2110]: E0510 00:45:22.377414 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.377838 kubelet[2110]: E0510 00:45:22.377800 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.377929 kubelet[2110]: W0510 00:45:22.377878 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.377929 kubelet[2110]: E0510 00:45:22.377901 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.383380 kubelet[2110]: E0510 00:45:22.383353 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:22.383617 kubelet[2110]: W0510 00:45:22.383551 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:22.383744 kubelet[2110]: E0510 00:45:22.383723 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:22.422360 env[1215]: time="2025-05-10T00:45:22.422300200Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7tgtz,Uid:ecb691eb-5a86-4e73-8f0e-04fbb8634b89,Namespace:calico-system,Attempt:0,}" May 10 00:45:22.446980 env[1215]: time="2025-05-10T00:45:22.446852543Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:22.446980 env[1215]: time="2025-05-10T00:45:22.446917228Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:22.447426 env[1215]: time="2025-05-10T00:45:22.446955700Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:22.447876 env[1215]: time="2025-05-10T00:45:22.447805467Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3 pid=2646 runtime=io.containerd.runc.v2 May 10 00:45:22.473126 systemd[1]: Started cri-containerd-c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3.scope. May 10 00:45:22.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.492000 audit: BPF prog-id=125 op=LOAD May 10 00:45:22.493000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.493000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2646 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363465343032623235376538636662653332646434366337623361 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2646 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363465343032623235376538636662653332646434366337623361 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.494000 audit: BPF prog-id=126 op=LOAD May 10 00:45:22.494000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000334c70 items=0 ppid=2646 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363465343032623235376538636662653332646434366337623361 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.495000 audit: BPF prog-id=127 op=LOAD May 10 00:45:22.495000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000334cb8 items=0 ppid=2646 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363465343032623235376538636662653332646434366337623361 May 10 00:45:22.497000 audit: BPF prog-id=127 op=UNLOAD May 10 00:45:22.497000 audit: BPF prog-id=126 op=UNLOAD May 10 00:45:22.497000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:22.497000 audit: BPF prog-id=128 op=LOAD May 10 00:45:22.497000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003350c8 items=0 ppid=2646 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:22.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6331363465343032623235376538636662653332646434366337623361 May 10 00:45:22.525142 env[1215]: time="2025-05-10T00:45:22.525084427Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7tgtz,Uid:ecb691eb-5a86-4e73-8f0e-04fbb8634b89,Namespace:calico-system,Attempt:0,} returns sandbox id \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\"" May 10 00:45:22.802906 kubelet[2110]: E0510 00:45:22.802779 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:24.129000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.17:22-111.161.65.209:45860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:24.130941 systemd[1]: Started sshd@7-10.128.0.17:22-111.161.65.209:45860.service. May 10 00:45:24.332157 env[1215]: time="2025-05-10T00:45:24.332097581Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.336914 env[1215]: time="2025-05-10T00:45:24.336852419Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.341335 env[1215]: time="2025-05-10T00:45:24.341274746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.345351 env[1215]: time="2025-05-10T00:45:24.345296092Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:24.346562 env[1215]: time="2025-05-10T00:45:24.346457944Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 00:45:24.349912 env[1215]: time="2025-05-10T00:45:24.349862331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 00:45:24.378023 env[1215]: time="2025-05-10T00:45:24.377966693Z" level=info msg="CreateContainer within sandbox \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 00:45:24.404276 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3218183593.mount: Deactivated successfully. May 10 00:45:24.406952 env[1215]: time="2025-05-10T00:45:24.406864818Z" level=info msg="CreateContainer within sandbox \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\"" May 10 00:45:24.407944 env[1215]: time="2025-05-10T00:45:24.407841433Z" level=info msg="StartContainer for \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\"" May 10 00:45:24.451113 systemd[1]: Started cri-containerd-e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7.scope. May 10 00:45:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.487000 audit: BPF prog-id=129 op=LOAD May 10 00:45:24.489000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.489000 audit[2693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2598 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633430623763646565303030313938366531383238663364333735 May 10 00:45:24.489000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.489000 audit[2693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2598 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.489000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633430623763646565303030313938366531383238663364333735 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.490000 audit: BPF prog-id=130 op=LOAD May 10 00:45:24.490000 audit[2693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035a190 items=0 ppid=2598 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.490000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633430623763646565303030313938366531383238663364333735 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.491000 audit: BPF prog-id=131 op=LOAD May 10 00:45:24.491000 audit[2693]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035a1d8 items=0 ppid=2598 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.491000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633430623763646565303030313938366531383238663364333735 May 10 00:45:24.492000 audit: BPF prog-id=131 op=UNLOAD May 10 00:45:24.492000 audit: BPF prog-id=130 op=UNLOAD May 10 00:45:24.493000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { perfmon } for pid=2693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit[2693]: AVC avc: denied { bpf } for pid=2693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:24.493000 audit: BPF prog-id=132 op=LOAD May 10 00:45:24.493000 audit[2693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035a5e8 items=0 ppid=2598 pid=2693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:24.493000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535633430623763646565303030313938366531383238663364333735 May 10 00:45:24.540397 env[1215]: time="2025-05-10T00:45:24.540328311Z" level=info msg="StartContainer for \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\" returns successfully" May 10 00:45:24.802277 kubelet[2110]: E0510 00:45:24.800130 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:24.944039 kubelet[2110]: I0510 00:45:24.943952 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-75794b44b7-gbzmc" podStartSLOduration=2.951928027 podStartE2EDuration="4.943923611s" podCreationTimestamp="2025-05-10 00:45:20 +0000 UTC" firstStartedPulling="2025-05-10 00:45:22.356622615 +0000 UTC m=+23.741696257" lastFinishedPulling="2025-05-10 00:45:24.348618201 +0000 UTC m=+25.733691841" observedRunningTime="2025-05-10 00:45:24.943360279 +0000 UTC m=+26.328433949" watchObservedRunningTime="2025-05-10 00:45:24.943923611 +0000 UTC m=+26.328997268" May 10 00:45:24.957965 kubelet[2110]: E0510 00:45:24.957922 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.957965 kubelet[2110]: W0510 00:45:24.957955 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.958319 kubelet[2110]: E0510 00:45:24.957988 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.958396 kubelet[2110]: E0510 00:45:24.958366 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.958396 kubelet[2110]: W0510 00:45:24.958384 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.958508 kubelet[2110]: E0510 00:45:24.958406 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.958911 kubelet[2110]: E0510 00:45:24.958723 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.958911 kubelet[2110]: W0510 00:45:24.958743 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.958911 kubelet[2110]: E0510 00:45:24.958764 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.959335 kubelet[2110]: E0510 00:45:24.959306 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.959335 kubelet[2110]: W0510 00:45:24.959326 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.959494 kubelet[2110]: E0510 00:45:24.959346 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.959704 kubelet[2110]: E0510 00:45:24.959680 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.959704 kubelet[2110]: W0510 00:45:24.959701 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.959858 kubelet[2110]: E0510 00:45:24.959720 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.960100 kubelet[2110]: E0510 00:45:24.960067 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.960100 kubelet[2110]: W0510 00:45:24.960085 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.960296 kubelet[2110]: E0510 00:45:24.960109 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.960442 kubelet[2110]: E0510 00:45:24.960422 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.960442 kubelet[2110]: W0510 00:45:24.960440 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.960600 kubelet[2110]: E0510 00:45:24.960458 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.960884 kubelet[2110]: E0510 00:45:24.960862 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.960884 kubelet[2110]: W0510 00:45:24.960881 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.961054 kubelet[2110]: E0510 00:45:24.960900 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.961263 kubelet[2110]: E0510 00:45:24.961243 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.961399 kubelet[2110]: W0510 00:45:24.961374 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.961494 kubelet[2110]: E0510 00:45:24.961404 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.961710 kubelet[2110]: E0510 00:45:24.961688 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.961710 kubelet[2110]: W0510 00:45:24.961707 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.961894 kubelet[2110]: E0510 00:45:24.961725 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.962051 kubelet[2110]: E0510 00:45:24.962030 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.962051 kubelet[2110]: W0510 00:45:24.962048 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.962233 kubelet[2110]: E0510 00:45:24.962080 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.962432 kubelet[2110]: E0510 00:45:24.962406 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.962432 kubelet[2110]: W0510 00:45:24.962424 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.962580 kubelet[2110]: E0510 00:45:24.962443 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.962756 kubelet[2110]: E0510 00:45:24.962736 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.962756 kubelet[2110]: W0510 00:45:24.962754 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.962914 kubelet[2110]: E0510 00:45:24.962772 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.963091 kubelet[2110]: E0510 00:45:24.963070 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.963091 kubelet[2110]: W0510 00:45:24.963088 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.963292 kubelet[2110]: E0510 00:45:24.963106 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:24.963444 kubelet[2110]: E0510 00:45:24.963426 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:24.963519 kubelet[2110]: W0510 00:45:24.963443 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:24.963519 kubelet[2110]: E0510 00:45:24.963460 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.002163 kubelet[2110]: E0510 00:45:25.002118 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.002163 kubelet[2110]: W0510 00:45:25.002155 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.002498 kubelet[2110]: E0510 00:45:25.002185 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.002658 kubelet[2110]: E0510 00:45:25.002630 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.002658 kubelet[2110]: W0510 00:45:25.002656 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.002835 kubelet[2110]: E0510 00:45:25.002685 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.003156 kubelet[2110]: E0510 00:45:25.003072 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.003156 kubelet[2110]: W0510 00:45:25.003094 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.003156 kubelet[2110]: E0510 00:45:25.003129 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.003528 kubelet[2110]: E0510 00:45:25.003504 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.003528 kubelet[2110]: W0510 00:45:25.003528 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.003704 kubelet[2110]: E0510 00:45:25.003555 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.003914 kubelet[2110]: E0510 00:45:25.003888 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.003914 kubelet[2110]: W0510 00:45:25.003911 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.004088 kubelet[2110]: E0510 00:45:25.004033 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.004304 kubelet[2110]: E0510 00:45:25.004281 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.004304 kubelet[2110]: W0510 00:45:25.004301 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.004483 kubelet[2110]: E0510 00:45:25.004419 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.005010 kubelet[2110]: E0510 00:45:25.004985 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.005010 kubelet[2110]: W0510 00:45:25.005006 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.005257 kubelet[2110]: E0510 00:45:25.005188 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.005487 kubelet[2110]: E0510 00:45:25.005453 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.005487 kubelet[2110]: W0510 00:45:25.005485 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.005646 kubelet[2110]: E0510 00:45:25.005509 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.005998 kubelet[2110]: E0510 00:45:25.005976 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.005998 kubelet[2110]: W0510 00:45:25.005996 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.006254 kubelet[2110]: E0510 00:45:25.006182 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.006897 kubelet[2110]: E0510 00:45:25.006723 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.006897 kubelet[2110]: W0510 00:45:25.006755 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.006897 kubelet[2110]: E0510 00:45:25.006789 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.007377 kubelet[2110]: E0510 00:45:25.007190 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.007377 kubelet[2110]: W0510 00:45:25.007209 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.007377 kubelet[2110]: E0510 00:45:25.007272 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.007843 kubelet[2110]: E0510 00:45:25.007660 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.007843 kubelet[2110]: W0510 00:45:25.007679 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.007843 kubelet[2110]: E0510 00:45:25.007702 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.008467 kubelet[2110]: E0510 00:45:25.008119 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.008467 kubelet[2110]: W0510 00:45:25.008137 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.008467 kubelet[2110]: E0510 00:45:25.008161 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.008677 kubelet[2110]: E0510 00:45:25.008519 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.008677 kubelet[2110]: W0510 00:45:25.008534 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.008677 kubelet[2110]: E0510 00:45:25.008554 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.009180 kubelet[2110]: E0510 00:45:25.009158 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.009180 kubelet[2110]: W0510 00:45:25.009178 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.009450 kubelet[2110]: E0510 00:45:25.009240 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.009663 kubelet[2110]: E0510 00:45:25.009640 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.009663 kubelet[2110]: W0510 00:45:25.009660 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.009816 kubelet[2110]: E0510 00:45:25.009685 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.010377 kubelet[2110]: E0510 00:45:25.010355 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.010377 kubelet[2110]: W0510 00:45:25.010373 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.010549 kubelet[2110]: E0510 00:45:25.010397 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.010819 kubelet[2110]: E0510 00:45:25.010800 2110 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 00:45:25.010819 kubelet[2110]: W0510 00:45:25.010818 2110 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 00:45:25.010958 kubelet[2110]: E0510 00:45:25.010839 2110 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 00:45:25.336382 env[1215]: time="2025-05-10T00:45:25.336303547Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:25.339628 env[1215]: time="2025-05-10T00:45:25.339568684Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:25.342162 env[1215]: time="2025-05-10T00:45:25.342101348Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:25.344486 env[1215]: time="2025-05-10T00:45:25.344433502Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:25.345379 env[1215]: time="2025-05-10T00:45:25.345315809Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 00:45:25.351111 env[1215]: time="2025-05-10T00:45:25.351056921Z" level=info msg="CreateContainer within sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:45:25.376743 env[1215]: time="2025-05-10T00:45:25.376673024Z" level=info msg="CreateContainer within sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\"" May 10 00:45:25.379066 env[1215]: time="2025-05-10T00:45:25.377680727Z" level=info msg="StartContainer for \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\"" May 10 00:45:25.418473 systemd[1]: Started cri-containerd-49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d.scope. May 10 00:45:25.469287 kernel: kauditd_printk_skb: 180 callbacks suppressed May 10 00:45:25.469480 kernel: audit: type=1400 audit(1746837925.440:956): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.469547 kernel: audit: type=1300 audit(1746837925.440:956): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7effb48012f8 items=0 ppid=2646 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.440000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7effb48012f8 items=0 ppid=2646 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643062333335616462616533326131313835333263623230643830 May 10 00:45:25.531133 kernel: audit: type=1327 audit(1746837925.440:956): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643062333335616462616533326131313835333263623230643830 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.558727 kernel: audit: type=1400 audit(1746837925.440:957): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.582248 kernel: audit: type=1400 audit(1746837925.440:957): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.606244 kernel: audit: type=1400 audit(1746837925.440:957): avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.611372 env[1215]: time="2025-05-10T00:45:25.611309865Z" level=info msg="StartContainer for \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\" returns successfully" May 10 00:45:25.440000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.633333 kernel: audit: type=1400 audit(1746837925.440:957): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.653530 systemd[1]: cri-containerd-49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d.scope: Deactivated successfully. May 10 00:45:25.659359 kernel: audit: type=1400 audit(1746837925.440:957): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.682346 kernel: audit: type=1400 audit(1746837925.440:957): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.711250 kernel: audit: type=1400 audit(1746837925.440:957): avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.440000 audit: BPF prog-id=133 op=LOAD May 10 00:45:25.440000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0000251f8 items=0 ppid=2646 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643062333335616462616533326131313835333263623230643830 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.446000 audit: BPF prog-id=134 op=LOAD May 10 00:45:25.446000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000025248 items=0 ppid=2646 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643062333335616462616533326131313835333263623230643830 May 10 00:45:25.530000 audit: BPF prog-id=134 op=UNLOAD May 10 00:45:25.530000 audit: BPF prog-id=133 op=UNLOAD May 10 00:45:25.530000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { perfmon } for pid=2762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit[2762]: AVC avc: denied { bpf } for pid=2762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:25.530000 audit: BPF prog-id=135 op=LOAD May 10 00:45:25.530000 audit[2762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000252d8 items=0 ppid=2646 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:25.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439643062333335616462616533326131313835333263623230643830 May 10 00:45:25.659000 audit: BPF prog-id=135 op=UNLOAD May 10 00:45:25.743890 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d-rootfs.mount: Deactivated successfully. May 10 00:45:25.933494 kubelet[2110]: I0510 00:45:25.933457 2110 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:26.318378 env[1215]: time="2025-05-10T00:45:26.318182483Z" level=info msg="shim disconnected" id=49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d May 10 00:45:26.318378 env[1215]: time="2025-05-10T00:45:26.318275126Z" level=warning msg="cleaning up after shim disconnected" id=49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d namespace=k8s.io May 10 00:45:26.318378 env[1215]: time="2025-05-10T00:45:26.318290935Z" level=info msg="cleaning up dead shim" May 10 00:45:26.331880 env[1215]: time="2025-05-10T00:45:26.331801087Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:26Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2807 runtime=io.containerd.runc.v2\n" May 10 00:45:26.800958 kubelet[2110]: E0510 00:45:26.800897 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:26.938937 env[1215]: time="2025-05-10T00:45:26.938883089Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 00:45:28.803442 kubelet[2110]: E0510 00:45:28.802914 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:30.800143 kubelet[2110]: E0510 00:45:30.800077 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:31.770235 env[1215]: time="2025-05-10T00:45:31.770137251Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:31.773252 env[1215]: time="2025-05-10T00:45:31.773180626Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:31.775780 env[1215]: time="2025-05-10T00:45:31.775735298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:31.777924 env[1215]: time="2025-05-10T00:45:31.777877312Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:31.778839 env[1215]: time="2025-05-10T00:45:31.778787959Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 00:45:31.782778 env[1215]: time="2025-05-10T00:45:31.782727847Z" level=info msg="CreateContainer within sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:45:31.806812 env[1215]: time="2025-05-10T00:45:31.806732407Z" level=info msg="CreateContainer within sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\"" May 10 00:45:31.809955 env[1215]: time="2025-05-10T00:45:31.809902145Z" level=info msg="StartContainer for \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\"" May 10 00:45:31.863184 systemd[1]: run-containerd-runc-k8s.io-7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d-runc.KpgSuM.mount: Deactivated successfully. May 10 00:45:31.870142 systemd[1]: Started cri-containerd-7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d.scope. May 10 00:45:31.891000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.898365 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:45:31.898529 kernel: audit: type=1400 audit(1746837931.891:963): avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.919628 kernel: audit: type=1300 audit(1746837931.891:963): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7facc4657848 items=0 ppid=2646 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.891000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7facc4657848 items=0 ppid=2646 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761626330363437613636363362643037396466396439393933646362 May 10 00:45:32.012072 kernel: audit: type=1327 audit(1746837931.891:963): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761626330363437613636363362643037396466396439393933646362 May 10 00:45:32.012294 kernel: audit: type=1400 audit(1746837931.891:964): avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.035132 kernel: audit: type=1400 audit(1746837931.891:964): avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.035280 kernel: audit: type=1400 audit(1746837931.891:964): avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.043301 env[1215]: time="2025-05-10T00:45:32.043235682Z" level=info msg="StartContainer for \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\" returns successfully" May 10 00:45:31.891000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.078247 kernel: audit: type=1400 audit(1746837931.891:964): avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.078412 kernel: audit: type=1400 audit(1746837931.891:964): avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.141495 kernel: audit: type=1400 audit(1746837931.891:964): avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:32.141677 kernel: audit: type=1400 audit(1746837931.891:964): avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.891000 audit: BPF prog-id=136 op=LOAD May 10 00:45:31.891000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000255ed8 items=0 ppid=2646 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.891000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761626330363437613636363362643037396466396439393933646362 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.952000 audit: BPF prog-id=137 op=LOAD May 10 00:45:31.952000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000255f28 items=0 ppid=2646 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761626330363437613636363362643037396466396439393933646362 May 10 00:45:31.953000 audit: BPF prog-id=137 op=UNLOAD May 10 00:45:31.954000 audit: BPF prog-id=136 op=UNLOAD May 10 00:45:31.954000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { perfmon } for pid=2827 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit[2827]: AVC avc: denied { bpf } for pid=2827 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:31.954000 audit: BPF prog-id=138 op=LOAD May 10 00:45:31.954000 audit[2827]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000255fb8 items=0 ppid=2646 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:31.954000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761626330363437613636363362643037396466396439393933646362 May 10 00:45:32.802807 kubelet[2110]: E0510 00:45:32.802746 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:32.961438 env[1215]: time="2025-05-10T00:45:32.961275368Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 00:45:32.964549 systemd[1]: cri-containerd-7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d.scope: Deactivated successfully. May 10 00:45:32.968000 audit: BPF prog-id=138 op=UNLOAD May 10 00:45:33.009376 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d-rootfs.mount: Deactivated successfully. May 10 00:45:33.036037 kubelet[2110]: I0510 00:45:33.034925 2110 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 00:45:33.066698 kubelet[2110]: I0510 00:45:33.066530 2110 topology_manager.go:215] "Topology Admit Handler" podUID="8c4cdfb5-cee1-4888-853f-5335203970a8" podNamespace="kube-system" podName="coredns-7db6d8ff4d-6zhnn" May 10 00:45:33.076185 systemd[1]: Created slice kubepods-burstable-pod8c4cdfb5_cee1_4888_853f_5335203970a8.slice. May 10 00:45:33.089967 kubelet[2110]: I0510 00:45:33.089918 2110 topology_manager.go:215] "Topology Admit Handler" podUID="58f0c618-8c39-4fc5-9de2-84bc9752ee7c" podNamespace="calico-apiserver" podName="calico-apiserver-8656cd8877-tqhzm" May 10 00:45:33.091276 kubelet[2110]: I0510 00:45:33.091246 2110 topology_manager.go:215] "Topology Admit Handler" podUID="717a7e75-4b38-438f-a17d-8863eee7015a" podNamespace="calico-system" podName="calico-kube-controllers-c5cc4b9d7-h77nx" May 10 00:45:33.091898 kubelet[2110]: I0510 00:45:33.091835 2110 topology_manager.go:215] "Topology Admit Handler" podUID="8760e388-ade0-4878-aa30-3b32b709df01" podNamespace="kube-system" podName="coredns-7db6d8ff4d-p768n" May 10 00:45:33.100102 systemd[1]: Created slice kubepods-besteffort-pod58f0c618_8c39_4fc5_9de2_84bc9752ee7c.slice. May 10 00:45:33.115533 kubelet[2110]: I0510 00:45:33.115491 2110 topology_manager.go:215] "Topology Admit Handler" podUID="e9284258-7d98-4c92-a4ab-848849f17105" podNamespace="calico-apiserver" podName="calico-apiserver-8656cd8877-b6k55" May 10 00:45:33.119306 kubelet[2110]: I0510 00:45:33.119150 2110 topology_manager.go:215] "Topology Admit Handler" podUID="2f8081a2-a538-42ca-bc08-56e312bd1da7" podNamespace="calico-apiserver" podName="calico-apiserver-7988f79fb9-8gxhl" May 10 00:45:33.122817 systemd[1]: Created slice kubepods-burstable-pod8760e388_ade0_4878_aa30_3b32b709df01.slice. May 10 00:45:33.137569 systemd[1]: Created slice kubepods-besteffort-pod717a7e75_4b38_438f_a17d_8863eee7015a.slice. May 10 00:45:33.150937 systemd[1]: Created slice kubepods-besteffort-pod2f8081a2_a538_42ca_bc08_56e312bd1da7.slice. May 10 00:45:33.162361 systemd[1]: Created slice kubepods-besteffort-pode9284258_7d98_4c92_a4ab_848849f17105.slice. May 10 00:45:33.213318 kubelet[2110]: I0510 00:45:33.213253 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/58f0c618-8c39-4fc5-9de2-84bc9752ee7c-calico-apiserver-certs\") pod \"calico-apiserver-8656cd8877-tqhzm\" (UID: \"58f0c618-8c39-4fc5-9de2-84bc9752ee7c\") " pod="calico-apiserver/calico-apiserver-8656cd8877-tqhzm" May 10 00:45:33.224050 kubelet[2110]: I0510 00:45:33.213515 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8760e388-ade0-4878-aa30-3b32b709df01-config-volume\") pod \"coredns-7db6d8ff4d-p768n\" (UID: \"8760e388-ade0-4878-aa30-3b32b709df01\") " pod="kube-system/coredns-7db6d8ff4d-p768n" May 10 00:45:33.224050 kubelet[2110]: I0510 00:45:33.213578 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v5kb9\" (UniqueName: \"kubernetes.io/projected/2f8081a2-a538-42ca-bc08-56e312bd1da7-kube-api-access-v5kb9\") pod \"calico-apiserver-7988f79fb9-8gxhl\" (UID: \"2f8081a2-a538-42ca-bc08-56e312bd1da7\") " pod="calico-apiserver/calico-apiserver-7988f79fb9-8gxhl" May 10 00:45:33.224050 kubelet[2110]: I0510 00:45:33.213611 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6sfpb\" (UniqueName: \"kubernetes.io/projected/58f0c618-8c39-4fc5-9de2-84bc9752ee7c-kube-api-access-6sfpb\") pod \"calico-apiserver-8656cd8877-tqhzm\" (UID: \"58f0c618-8c39-4fc5-9de2-84bc9752ee7c\") " pod="calico-apiserver/calico-apiserver-8656cd8877-tqhzm" May 10 00:45:33.224050 kubelet[2110]: I0510 00:45:33.213646 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f68pw\" (UniqueName: \"kubernetes.io/projected/717a7e75-4b38-438f-a17d-8863eee7015a-kube-api-access-f68pw\") pod \"calico-kube-controllers-c5cc4b9d7-h77nx\" (UID: \"717a7e75-4b38-438f-a17d-8863eee7015a\") " pod="calico-system/calico-kube-controllers-c5cc4b9d7-h77nx" May 10 00:45:33.224050 kubelet[2110]: I0510 00:45:33.213675 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tgm5b\" (UniqueName: \"kubernetes.io/projected/8c4cdfb5-cee1-4888-853f-5335203970a8-kube-api-access-tgm5b\") pod \"coredns-7db6d8ff4d-6zhnn\" (UID: \"8c4cdfb5-cee1-4888-853f-5335203970a8\") " pod="kube-system/coredns-7db6d8ff4d-6zhnn" May 10 00:45:33.224447 kubelet[2110]: I0510 00:45:33.213706 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rcxrx\" (UniqueName: \"kubernetes.io/projected/8760e388-ade0-4878-aa30-3b32b709df01-kube-api-access-rcxrx\") pod \"coredns-7db6d8ff4d-p768n\" (UID: \"8760e388-ade0-4878-aa30-3b32b709df01\") " pod="kube-system/coredns-7db6d8ff4d-p768n" May 10 00:45:33.224447 kubelet[2110]: I0510 00:45:33.213734 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/717a7e75-4b38-438f-a17d-8863eee7015a-tigera-ca-bundle\") pod \"calico-kube-controllers-c5cc4b9d7-h77nx\" (UID: \"717a7e75-4b38-438f-a17d-8863eee7015a\") " pod="calico-system/calico-kube-controllers-c5cc4b9d7-h77nx" May 10 00:45:33.224447 kubelet[2110]: I0510 00:45:33.213772 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l5xz7\" (UniqueName: \"kubernetes.io/projected/e9284258-7d98-4c92-a4ab-848849f17105-kube-api-access-l5xz7\") pod \"calico-apiserver-8656cd8877-b6k55\" (UID: \"e9284258-7d98-4c92-a4ab-848849f17105\") " pod="calico-apiserver/calico-apiserver-8656cd8877-b6k55" May 10 00:45:33.224447 kubelet[2110]: I0510 00:45:33.213799 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2f8081a2-a538-42ca-bc08-56e312bd1da7-calico-apiserver-certs\") pod \"calico-apiserver-7988f79fb9-8gxhl\" (UID: \"2f8081a2-a538-42ca-bc08-56e312bd1da7\") " pod="calico-apiserver/calico-apiserver-7988f79fb9-8gxhl" May 10 00:45:33.224447 kubelet[2110]: I0510 00:45:33.213830 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e9284258-7d98-4c92-a4ab-848849f17105-calico-apiserver-certs\") pod \"calico-apiserver-8656cd8877-b6k55\" (UID: \"e9284258-7d98-4c92-a4ab-848849f17105\") " pod="calico-apiserver/calico-apiserver-8656cd8877-b6k55" May 10 00:45:33.224720 kubelet[2110]: I0510 00:45:33.213856 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/8c4cdfb5-cee1-4888-853f-5335203970a8-config-volume\") pod \"coredns-7db6d8ff4d-6zhnn\" (UID: \"8c4cdfb5-cee1-4888-853f-5335203970a8\") " pod="kube-system/coredns-7db6d8ff4d-6zhnn" May 10 00:45:33.411296 env[1215]: time="2025-05-10T00:45:33.409952474Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8656cd8877-tqhzm,Uid:58f0c618-8c39-4fc5-9de2-84bc9752ee7c,Namespace:calico-apiserver,Attempt:0,}" May 10 00:45:33.441240 env[1215]: time="2025-05-10T00:45:33.441170014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-p768n,Uid:8760e388-ade0-4878-aa30-3b32b709df01,Namespace:kube-system,Attempt:0,}" May 10 00:45:33.447837 env[1215]: time="2025-05-10T00:45:33.447761782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c5cc4b9d7-h77nx,Uid:717a7e75-4b38-438f-a17d-8863eee7015a,Namespace:calico-system,Attempt:0,}" May 10 00:45:33.459285 env[1215]: time="2025-05-10T00:45:33.459205531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7988f79fb9-8gxhl,Uid:2f8081a2-a538-42ca-bc08-56e312bd1da7,Namespace:calico-apiserver,Attempt:0,}" May 10 00:45:33.526443 env[1215]: time="2025-05-10T00:45:33.526357556Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8656cd8877-b6k55,Uid:e9284258-7d98-4c92-a4ab-848849f17105,Namespace:calico-apiserver,Attempt:0,}" May 10 00:45:33.683172 env[1215]: time="2025-05-10T00:45:33.683114632Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-6zhnn,Uid:8c4cdfb5-cee1-4888-853f-5335203970a8,Namespace:kube-system,Attempt:0,}" May 10 00:45:33.800948 env[1215]: time="2025-05-10T00:45:33.800883212Z" level=info msg="shim disconnected" id=7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d May 10 00:45:33.800948 env[1215]: time="2025-05-10T00:45:33.800946935Z" level=warning msg="cleaning up after shim disconnected" id=7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d namespace=k8s.io May 10 00:45:33.801255 env[1215]: time="2025-05-10T00:45:33.800962552Z" level=info msg="cleaning up dead shim" May 10 00:45:33.814866 env[1215]: time="2025-05-10T00:45:33.814765995Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:45:33Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2879 runtime=io.containerd.runc.v2\n" May 10 00:45:33.987677 env[1215]: time="2025-05-10T00:45:33.982988623Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 00:45:34.273132 env[1215]: time="2025-05-10T00:45:34.267295782Z" level=error msg="Failed to destroy network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.271664 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d-shm.mount: Deactivated successfully. May 10 00:45:34.275098 env[1215]: time="2025-05-10T00:45:34.275030867Z" level=error msg="Failed to destroy network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.283724 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3-shm.mount: Deactivated successfully. May 10 00:45:34.287457 env[1215]: time="2025-05-10T00:45:34.287385774Z" level=error msg="encountered an error cleaning up failed sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.288085 env[1215]: time="2025-05-10T00:45:34.288036236Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-p768n,Uid:8760e388-ade0-4878-aa30-3b32b709df01,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.288385 env[1215]: time="2025-05-10T00:45:34.287970077Z" level=error msg="encountered an error cleaning up failed sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.289358 kubelet[2110]: E0510 00:45:34.288721 2110 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.289358 kubelet[2110]: E0510 00:45:34.288889 2110 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-p768n" May 10 00:45:34.289358 kubelet[2110]: E0510 00:45:34.288922 2110 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-p768n" May 10 00:45:34.289921 kubelet[2110]: E0510 00:45:34.288988 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-p768n_kube-system(8760e388-ade0-4878-aa30-3b32b709df01)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-p768n_kube-system(8760e388-ade0-4878-aa30-3b32b709df01)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-p768n" podUID="8760e388-ade0-4878-aa30-3b32b709df01" May 10 00:45:34.290203 env[1215]: time="2025-05-10T00:45:34.290150084Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-6zhnn,Uid:8c4cdfb5-cee1-4888-853f-5335203970a8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.290824 kubelet[2110]: E0510 00:45:34.290591 2110 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.290824 kubelet[2110]: E0510 00:45:34.290659 2110 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-6zhnn" May 10 00:45:34.290824 kubelet[2110]: E0510 00:45:34.290688 2110 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-6zhnn" May 10 00:45:34.291055 kubelet[2110]: E0510 00:45:34.290740 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-6zhnn_kube-system(8c4cdfb5-cee1-4888-853f-5335203970a8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-6zhnn_kube-system(8c4cdfb5-cee1-4888-853f-5335203970a8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-6zhnn" podUID="8c4cdfb5-cee1-4888-853f-5335203970a8" May 10 00:45:34.300652 env[1215]: time="2025-05-10T00:45:34.300577662Z" level=error msg="Failed to destroy network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.308161 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6-shm.mount: Deactivated successfully. May 10 00:45:34.313718 env[1215]: time="2025-05-10T00:45:34.313639449Z" level=error msg="encountered an error cleaning up failed sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.314463 env[1215]: time="2025-05-10T00:45:34.314409315Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8656cd8877-tqhzm,Uid:58f0c618-8c39-4fc5-9de2-84bc9752ee7c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.316203 kubelet[2110]: E0510 00:45:34.314943 2110 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.316203 kubelet[2110]: E0510 00:45:34.315017 2110 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8656cd8877-tqhzm" May 10 00:45:34.316203 kubelet[2110]: E0510 00:45:34.315050 2110 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8656cd8877-tqhzm" May 10 00:45:34.316491 kubelet[2110]: E0510 00:45:34.315111 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8656cd8877-tqhzm_calico-apiserver(58f0c618-8c39-4fc5-9de2-84bc9752ee7c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8656cd8877-tqhzm_calico-apiserver(58f0c618-8c39-4fc5-9de2-84bc9752ee7c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8656cd8877-tqhzm" podUID="58f0c618-8c39-4fc5-9de2-84bc9752ee7c" May 10 00:45:34.340832 env[1215]: time="2025-05-10T00:45:34.340753148Z" level=error msg="Failed to destroy network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.349105 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7-shm.mount: Deactivated successfully. May 10 00:45:34.353179 env[1215]: time="2025-05-10T00:45:34.353108421Z" level=error msg="encountered an error cleaning up failed sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.353514 env[1215]: time="2025-05-10T00:45:34.353449783Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c5cc4b9d7-h77nx,Uid:717a7e75-4b38-438f-a17d-8863eee7015a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.355289 kubelet[2110]: E0510 00:45:34.355234 2110 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.355426 kubelet[2110]: E0510 00:45:34.355332 2110 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c5cc4b9d7-h77nx" May 10 00:45:34.355426 kubelet[2110]: E0510 00:45:34.355386 2110 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c5cc4b9d7-h77nx" May 10 00:45:34.355559 kubelet[2110]: E0510 00:45:34.355473 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-c5cc4b9d7-h77nx_calico-system(717a7e75-4b38-438f-a17d-8863eee7015a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-c5cc4b9d7-h77nx_calico-system(717a7e75-4b38-438f-a17d-8863eee7015a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c5cc4b9d7-h77nx" podUID="717a7e75-4b38-438f-a17d-8863eee7015a" May 10 00:45:34.357906 env[1215]: time="2025-05-10T00:45:34.357847606Z" level=error msg="Failed to destroy network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.358742 env[1215]: time="2025-05-10T00:45:34.358553319Z" level=error msg="Failed to destroy network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.360071 env[1215]: time="2025-05-10T00:45:34.359082869Z" level=error msg="encountered an error cleaning up failed sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.360071 env[1215]: time="2025-05-10T00:45:34.359200805Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7988f79fb9-8gxhl,Uid:2f8081a2-a538-42ca-bc08-56e312bd1da7,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.360362 kubelet[2110]: E0510 00:45:34.359756 2110 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.360362 kubelet[2110]: E0510 00:45:34.360307 2110 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7988f79fb9-8gxhl" May 10 00:45:34.360716 kubelet[2110]: E0510 00:45:34.360563 2110 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7988f79fb9-8gxhl" May 10 00:45:34.360716 kubelet[2110]: E0510 00:45:34.360637 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7988f79fb9-8gxhl_calico-apiserver(2f8081a2-a538-42ca-bc08-56e312bd1da7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7988f79fb9-8gxhl_calico-apiserver(2f8081a2-a538-42ca-bc08-56e312bd1da7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7988f79fb9-8gxhl" podUID="2f8081a2-a538-42ca-bc08-56e312bd1da7" May 10 00:45:34.361337 env[1215]: time="2025-05-10T00:45:34.361200300Z" level=error msg="encountered an error cleaning up failed sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.361552 env[1215]: time="2025-05-10T00:45:34.361499649Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8656cd8877-b6k55,Uid:e9284258-7d98-4c92-a4ab-848849f17105,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.362849 kubelet[2110]: E0510 00:45:34.362072 2110 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.362849 kubelet[2110]: E0510 00:45:34.362156 2110 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8656cd8877-b6k55" May 10 00:45:34.362849 kubelet[2110]: E0510 00:45:34.362193 2110 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-8656cd8877-b6k55" May 10 00:45:34.363109 kubelet[2110]: E0510 00:45:34.362338 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-8656cd8877-b6k55_calico-apiserver(e9284258-7d98-4c92-a4ab-848849f17105)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-8656cd8877-b6k55_calico-apiserver(e9284258-7d98-4c92-a4ab-848849f17105)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8656cd8877-b6k55" podUID="e9284258-7d98-4c92-a4ab-848849f17105" May 10 00:45:34.812206 systemd[1]: Created slice kubepods-besteffort-pod59ed8057_dfcb_47c2_9e56_afc23d0a505f.slice. May 10 00:45:34.828999 env[1215]: time="2025-05-10T00:45:34.828830355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nv9sq,Uid:59ed8057-dfcb-47c2-9e56-afc23d0a505f,Namespace:calico-system,Attempt:0,}" May 10 00:45:34.985893 kubelet[2110]: I0510 00:45:34.982769 2110 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:45:34.986628 env[1215]: time="2025-05-10T00:45:34.986583347Z" level=info msg="StopPodSandbox for \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\"" May 10 00:45:34.997072 env[1215]: time="2025-05-10T00:45:34.996998002Z" level=error msg="Failed to destroy network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.997682 env[1215]: time="2025-05-10T00:45:34.997519993Z" level=error msg="encountered an error cleaning up failed sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.998172 env[1215]: time="2025-05-10T00:45:34.998111625Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nv9sq,Uid:59ed8057-dfcb-47c2-9e56-afc23d0a505f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.999528 kubelet[2110]: E0510 00:45:34.999473 2110 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:34.999673 kubelet[2110]: E0510 00:45:34.999541 2110 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nv9sq" May 10 00:45:34.999673 kubelet[2110]: E0510 00:45:34.999572 2110 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nv9sq" May 10 00:45:34.999673 kubelet[2110]: E0510 00:45:34.999652 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nv9sq_calico-system(59ed8057-dfcb-47c2-9e56-afc23d0a505f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nv9sq_calico-system(59ed8057-dfcb-47c2-9e56-afc23d0a505f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:35.001898 kubelet[2110]: I0510 00:45:35.001842 2110 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:35.015835 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98-shm.mount: Deactivated successfully. May 10 00:45:35.016429 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11-shm.mount: Deactivated successfully. May 10 00:45:35.024661 env[1215]: time="2025-05-10T00:45:35.024609519Z" level=info msg="StopPodSandbox for \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\"" May 10 00:45:35.042250 kubelet[2110]: I0510 00:45:35.041371 2110 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:45:35.044647 env[1215]: time="2025-05-10T00:45:35.044594157Z" level=info msg="StopPodSandbox for \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\"" May 10 00:45:35.050967 kubelet[2110]: I0510 00:45:35.049424 2110 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:35.052683 env[1215]: time="2025-05-10T00:45:35.052540200Z" level=info msg="StopPodSandbox for \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\"" May 10 00:45:35.056879 kubelet[2110]: I0510 00:45:35.056175 2110 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:45:35.061824 env[1215]: time="2025-05-10T00:45:35.061772466Z" level=info msg="StopPodSandbox for \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\"" May 10 00:45:35.073750 kubelet[2110]: I0510 00:45:35.071418 2110 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:35.074753 env[1215]: time="2025-05-10T00:45:35.074701316Z" level=info msg="StopPodSandbox for \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\"" May 10 00:45:35.186464 env[1215]: time="2025-05-10T00:45:35.186386735Z" level=error msg="StopPodSandbox for \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\" failed" error="failed to destroy network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:35.187100 kubelet[2110]: E0510 00:45:35.187033 2110 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:45:35.187307 kubelet[2110]: E0510 00:45:35.187126 2110 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d"} May 10 00:45:35.187307 kubelet[2110]: E0510 00:45:35.187282 2110 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8760e388-ade0-4878-aa30-3b32b709df01\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:35.187497 kubelet[2110]: E0510 00:45:35.187324 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8760e388-ade0-4878-aa30-3b32b709df01\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-p768n" podUID="8760e388-ade0-4878-aa30-3b32b709df01" May 10 00:45:35.222697 env[1215]: time="2025-05-10T00:45:35.222507658Z" level=error msg="StopPodSandbox for \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\" failed" error="failed to destroy network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:35.223454 kubelet[2110]: E0510 00:45:35.223178 2110 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:45:35.223454 kubelet[2110]: E0510 00:45:35.223281 2110 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98"} May 10 00:45:35.223454 kubelet[2110]: E0510 00:45:35.223354 2110 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e9284258-7d98-4c92-a4ab-848849f17105\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:35.223454 kubelet[2110]: E0510 00:45:35.223408 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e9284258-7d98-4c92-a4ab-848849f17105\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8656cd8877-b6k55" podUID="e9284258-7d98-4c92-a4ab-848849f17105" May 10 00:45:35.236447 env[1215]: time="2025-05-10T00:45:35.236376498Z" level=error msg="StopPodSandbox for \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\" failed" error="failed to destroy network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:35.237282 kubelet[2110]: E0510 00:45:35.236977 2110 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:35.237282 kubelet[2110]: E0510 00:45:35.237106 2110 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3"} May 10 00:45:35.237282 kubelet[2110]: E0510 00:45:35.237174 2110 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8c4cdfb5-cee1-4888-853f-5335203970a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:35.237282 kubelet[2110]: E0510 00:45:35.237237 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8c4cdfb5-cee1-4888-853f-5335203970a8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-6zhnn" podUID="8c4cdfb5-cee1-4888-853f-5335203970a8" May 10 00:45:35.288665 env[1215]: time="2025-05-10T00:45:35.288590188Z" level=error msg="StopPodSandbox for \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\" failed" error="failed to destroy network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:35.289482 kubelet[2110]: E0510 00:45:35.289173 2110 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:35.289482 kubelet[2110]: E0510 00:45:35.289301 2110 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7"} May 10 00:45:35.289482 kubelet[2110]: E0510 00:45:35.289373 2110 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"717a7e75-4b38-438f-a17d-8863eee7015a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:35.289482 kubelet[2110]: E0510 00:45:35.289417 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"717a7e75-4b38-438f-a17d-8863eee7015a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c5cc4b9d7-h77nx" podUID="717a7e75-4b38-438f-a17d-8863eee7015a" May 10 00:45:35.290352 kubelet[2110]: E0510 00:45:35.290040 2110 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:45:35.290352 kubelet[2110]: E0510 00:45:35.290098 2110 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6"} May 10 00:45:35.290352 kubelet[2110]: E0510 00:45:35.290142 2110 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"58f0c618-8c39-4fc5-9de2-84bc9752ee7c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:35.290352 kubelet[2110]: E0510 00:45:35.290180 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"58f0c618-8c39-4fc5-9de2-84bc9752ee7c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-8656cd8877-tqhzm" podUID="58f0c618-8c39-4fc5-9de2-84bc9752ee7c" May 10 00:45:35.290647 env[1215]: time="2025-05-10T00:45:35.289760054Z" level=error msg="StopPodSandbox for \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\" failed" error="failed to destroy network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:35.321096 env[1215]: time="2025-05-10T00:45:35.321013166Z" level=error msg="StopPodSandbox for \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\" failed" error="failed to destroy network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:35.321954 kubelet[2110]: E0510 00:45:35.321713 2110 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:35.321954 kubelet[2110]: E0510 00:45:35.321788 2110 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11"} May 10 00:45:35.321954 kubelet[2110]: E0510 00:45:35.321860 2110 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2f8081a2-a538-42ca-bc08-56e312bd1da7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:35.321954 kubelet[2110]: E0510 00:45:35.321896 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2f8081a2-a538-42ca-bc08-56e312bd1da7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7988f79fb9-8gxhl" podUID="2f8081a2-a538-42ca-bc08-56e312bd1da7" May 10 00:45:36.075840 kubelet[2110]: I0510 00:45:36.075447 2110 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:45:36.077711 env[1215]: time="2025-05-10T00:45:36.077660782Z" level=info msg="StopPodSandbox for \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\"" May 10 00:45:36.120556 env[1215]: time="2025-05-10T00:45:36.120469266Z" level=error msg="StopPodSandbox for \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\" failed" error="failed to destroy network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 00:45:36.120950 kubelet[2110]: E0510 00:45:36.120888 2110 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:45:36.121147 kubelet[2110]: E0510 00:45:36.120967 2110 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37"} May 10 00:45:36.121147 kubelet[2110]: E0510 00:45:36.121021 2110 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"59ed8057-dfcb-47c2-9e56-afc23d0a505f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 00:45:36.121147 kubelet[2110]: E0510 00:45:36.121054 2110 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"59ed8057-dfcb-47c2-9e56-afc23d0a505f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nv9sq" podUID="59ed8057-dfcb-47c2-9e56-afc23d0a505f" May 10 00:45:41.262431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2785463019.mount: Deactivated successfully. May 10 00:45:41.306359 env[1215]: time="2025-05-10T00:45:41.306285527Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:41.309379 env[1215]: time="2025-05-10T00:45:41.309332983Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:41.312539 env[1215]: time="2025-05-10T00:45:41.312482419Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:41.314881 env[1215]: time="2025-05-10T00:45:41.314833846Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:41.315852 env[1215]: time="2025-05-10T00:45:41.315808588Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 00:45:41.341473 env[1215]: time="2025-05-10T00:45:41.341403961Z" level=info msg="CreateContainer within sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:45:41.367857 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2485337579.mount: Deactivated successfully. May 10 00:45:41.375030 env[1215]: time="2025-05-10T00:45:41.374976002Z" level=info msg="CreateContainer within sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\"" May 10 00:45:41.378008 env[1215]: time="2025-05-10T00:45:41.377022399Z" level=info msg="StartContainer for \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\"" May 10 00:45:41.403526 systemd[1]: Started cri-containerd-005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa.scope. May 10 00:45:41.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.439382 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 00:45:41.439558 kernel: audit: type=1400 audit(1746837941.431:970): avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9f60ebe4d8 items=0 ppid=2646 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030356163323538616231376564313261376631613435356564306437 May 10 00:45:41.521411 kernel: audit: type=1300 audit(1746837941.431:970): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9f60ebe4d8 items=0 ppid=2646 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.521622 kernel: audit: type=1327 audit(1746837941.431:970): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030356163323538616231376564313261376631613435356564306437 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.564433 kernel: audit: type=1400 audit(1746837941.431:971): avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.564638 kernel: audit: type=1400 audit(1746837941.431:971): avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.606991 kernel: audit: type=1400 audit(1746837941.431:971): avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.607130 kernel: audit: type=1400 audit(1746837941.431:971): avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.607359 kernel: audit: type=1400 audit(1746837941.431:971): avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.671957 kernel: audit: type=1400 audit(1746837941.431:971): avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.672151 kernel: audit: type=1400 audit(1746837941.431:971): avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.431000 audit: BPF prog-id=139 op=LOAD May 10 00:45:41.431000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002343d8 items=0 ppid=2646 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.431000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030356163323538616231376564313261376631613435356564306437 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.520000 audit: BPF prog-id=140 op=LOAD May 10 00:45:41.520000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003ea4f8 items=0 ppid=2646 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.520000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030356163323538616231376564313261376631613435356564306437 May 10 00:45:41.520000 audit: BPF prog-id=140 op=UNLOAD May 10 00:45:41.520000 audit: BPF prog-id=139 op=UNLOAD May 10 00:45:41.521000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { perfmon } for pid=3263 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit[3263]: AVC avc: denied { bpf } for pid=3263 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:41.521000 audit: BPF prog-id=141 op=LOAD May 10 00:45:41.521000 audit[3263]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003ea588 items=0 ppid=2646 pid=3263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:41.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030356163323538616231376564313261376631613435356564306437 May 10 00:45:41.674408 env[1215]: time="2025-05-10T00:45:41.674319938Z" level=info msg="StartContainer for \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\" returns successfully" May 10 00:45:41.746455 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 00:45:41.746642 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 00:45:43.094992 kubelet[2110]: I0510 00:45:43.094942 2110 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:43.147000 audit[3359]: AVC avc: denied { write } for pid=3359 comm="tee" name="fd" dev="proc" ino=25095 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:43.161000 audit[3368]: AVC avc: denied { write } for pid=3368 comm="tee" name="fd" dev="proc" ino=24020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:43.147000 audit[3359]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda586f9c1 a2=241 a3=1b6 items=1 ppid=3340 pid=3359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:43.147000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:45:43.147000 audit: PATH item=0 name="/dev/fd/63" inode=24005 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:43.147000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:43.167000 audit[3373]: AVC avc: denied { write } for pid=3373 comm="tee" name="fd" dev="proc" ino=25105 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:43.167000 audit[3373]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7ad059d1 a2=241 a3=1b6 items=1 ppid=3327 pid=3373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:43.167000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:45:43.167000 audit: PATH item=0 name="/dev/fd/63" inode=25099 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:43.167000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:43.177000 audit[3365]: AVC avc: denied { write } for pid=3365 comm="tee" name="fd" dev="proc" ino=24026 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:43.181000 audit[3380]: AVC avc: denied { write } for pid=3380 comm="tee" name="fd" dev="proc" ino=24029 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:43.177000 audit[3365]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe32e279d0 a2=241 a3=1b6 items=1 ppid=3328 pid=3365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:43.177000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:45:43.161000 audit[3368]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda393d9c0 a2=241 a3=1b6 items=1 ppid=3332 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:43.161000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:45:43.161000 audit: PATH item=0 name="/dev/fd/63" inode=25098 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:43.161000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:43.177000 audit: PATH item=0 name="/dev/fd/63" inode=25092 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:43.177000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:43.202000 audit[3404]: AVC avc: denied { write } for pid=3404 comm="tee" name="fd" dev="proc" ino=24034 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:43.181000 audit[3380]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5ac3d9d2 a2=241 a3=1b6 items=1 ppid=3337 pid=3380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:43.181000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:45:43.181000 audit: PATH item=0 name="/dev/fd/63" inode=24017 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:43.181000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:43.220000 audit[3388]: AVC avc: denied { write } for pid=3388 comm="tee" name="fd" dev="proc" ino=24039 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:45:43.220000 audit[3388]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee63099d0 a2=241 a3=1b6 items=1 ppid=3331 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:43.220000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:45:43.220000 audit: PATH item=0 name="/dev/fd/63" inode=24022 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:43.220000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:43.202000 audit[3404]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff665df9d0 a2=241 a3=1b6 items=1 ppid=3352 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:43.202000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:45:43.202000 audit: PATH item=0 name="/dev/fd/63" inode=25113 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:45:43.202000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:45:46.801377 env[1215]: time="2025-05-10T00:45:46.801225374Z" level=info msg="StopPodSandbox for \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\"" May 10 00:45:46.802290 env[1215]: time="2025-05-10T00:45:46.802130646Z" level=info msg="StopPodSandbox for \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\"" May 10 00:45:46.901721 kubelet[2110]: I0510 00:45:46.901635 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-7tgtz" podStartSLOduration=8.111393709 podStartE2EDuration="26.901607401s" podCreationTimestamp="2025-05-10 00:45:20 +0000 UTC" firstStartedPulling="2025-05-10 00:45:22.527102132 +0000 UTC m=+23.912175763" lastFinishedPulling="2025-05-10 00:45:41.317315819 +0000 UTC m=+42.702389455" observedRunningTime="2025-05-10 00:45:42.112127231 +0000 UTC m=+43.497200889" watchObservedRunningTime="2025-05-10 00:45:46.901607401 +0000 UTC m=+48.286681058" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.902 [INFO][3506] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.902 [INFO][3506] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" iface="eth0" netns="/var/run/netns/cni-319ecb2d-fb04-9668-3b9a-dfc346c02c19" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.902 [INFO][3506] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" iface="eth0" netns="/var/run/netns/cni-319ecb2d-fb04-9668-3b9a-dfc346c02c19" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.903 [INFO][3506] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" iface="eth0" netns="/var/run/netns/cni-319ecb2d-fb04-9668-3b9a-dfc346c02c19" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.903 [INFO][3506] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.903 [INFO][3506] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.951 [INFO][3519] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.951 [INFO][3519] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.952 [INFO][3519] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.964 [WARNING][3519] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.964 [INFO][3519] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.966 [INFO][3519] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:46.977673 env[1215]: 2025-05-10 00:45:46.969 [INFO][3506] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:46.975969 systemd[1]: run-netns-cni\x2d319ecb2d\x2dfb04\x2d9668\x2d3b9a\x2ddfc346c02c19.mount: Deactivated successfully. May 10 00:45:46.978868 env[1215]: time="2025-05-10T00:45:46.977745628Z" level=info msg="TearDown network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\" successfully" May 10 00:45:46.978868 env[1215]: time="2025-05-10T00:45:46.977807998Z" level=info msg="StopPodSandbox for \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\" returns successfully" May 10 00:45:46.978868 env[1215]: time="2025-05-10T00:45:46.978797247Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c5cc4b9d7-h77nx,Uid:717a7e75-4b38-438f-a17d-8863eee7015a,Namespace:calico-system,Attempt:1,}" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.908 [INFO][3507] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.909 [INFO][3507] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" iface="eth0" netns="/var/run/netns/cni-55bb00df-6b36-f608-ca81-ce920dcad20e" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.909 [INFO][3507] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" iface="eth0" netns="/var/run/netns/cni-55bb00df-6b36-f608-ca81-ce920dcad20e" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.910 [INFO][3507] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" iface="eth0" netns="/var/run/netns/cni-55bb00df-6b36-f608-ca81-ce920dcad20e" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.910 [INFO][3507] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.910 [INFO][3507] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.965 [INFO][3525] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.965 [INFO][3525] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.966 [INFO][3525] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.984 [WARNING][3525] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.984 [INFO][3525] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.986 [INFO][3525] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:46.992196 env[1215]: 2025-05-10 00:45:46.988 [INFO][3507] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:45:46.996638 systemd[1]: run-netns-cni\x2d55bb00df\x2d6b36\x2df608\x2dca81\x2dce920dcad20e.mount: Deactivated successfully. May 10 00:45:46.999153 env[1215]: time="2025-05-10T00:45:46.999069829Z" level=info msg="TearDown network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\" successfully" May 10 00:45:46.999153 env[1215]: time="2025-05-10T00:45:46.999124557Z" level=info msg="StopPodSandbox for \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\" returns successfully" May 10 00:45:47.000119 env[1215]: time="2025-05-10T00:45:47.000074010Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nv9sq,Uid:59ed8057-dfcb-47c2-9e56-afc23d0a505f,Namespace:calico-system,Attempt:1,}" May 10 00:45:47.258662 systemd-networkd[1024]: calic784db14222: Link UP May 10 00:45:47.275460 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:45:47.275727 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic784db14222: link becomes ready May 10 00:45:47.281357 systemd-networkd[1024]: calic784db14222: Gained carrier May 10 00:45:47.304958 systemd-networkd[1024]: cali7c942440a10: Link UP May 10 00:45:47.314267 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7c942440a10: link becomes ready May 10 00:45:47.315586 systemd-networkd[1024]: cali7c942440a10: Gained carrier May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.081 [INFO][3534] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.097 [INFO][3534] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0 calico-kube-controllers-c5cc4b9d7- calico-system 717a7e75-4b38-438f-a17d-8863eee7015a 776 0 2025-05-10 00:45:20 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:c5cc4b9d7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb calico-kube-controllers-c5cc4b9d7-h77nx eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calic784db14222 [] []}} ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Namespace="calico-system" Pod="calico-kube-controllers-c5cc4b9d7-h77nx" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.097 [INFO][3534] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Namespace="calico-system" Pod="calico-kube-controllers-c5cc4b9d7-h77nx" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.162 [INFO][3558] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.178 [INFO][3558] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000314a40), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", "pod":"calico-kube-controllers-c5cc4b9d7-h77nx", "timestamp":"2025-05-10 00:45:47.162309388 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.178 [INFO][3558] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.178 [INFO][3558] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.178 [INFO][3558] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.181 [INFO][3558] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.187 [INFO][3558] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.194 [INFO][3558] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.196 [INFO][3558] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.200 [INFO][3558] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.200 [INFO][3558] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.202 [INFO][3558] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622 May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.210 [INFO][3558] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.224 [INFO][3558] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.65/26] block=192.168.5.64/26 handle="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.224 [INFO][3558] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.65/26] handle="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.224 [INFO][3558] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:47.327434 env[1215]: 2025-05-10 00:45:47.224 [INFO][3558] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.65/26] IPv6=[] ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:47.328777 env[1215]: 2025-05-10 00:45:47.227 [INFO][3534] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Namespace="calico-system" Pod="calico-kube-controllers-c5cc4b9d7-h77nx" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0", GenerateName:"calico-kube-controllers-c5cc4b9d7-", Namespace:"calico-system", SelfLink:"", UID:"717a7e75-4b38-438f-a17d-8863eee7015a", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c5cc4b9d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"", Pod:"calico-kube-controllers-c5cc4b9d7-h77nx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic784db14222", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:47.328777 env[1215]: 2025-05-10 00:45:47.227 [INFO][3534] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.65/32] ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Namespace="calico-system" Pod="calico-kube-controllers-c5cc4b9d7-h77nx" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:47.328777 env[1215]: 2025-05-10 00:45:47.227 [INFO][3534] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic784db14222 ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Namespace="calico-system" Pod="calico-kube-controllers-c5cc4b9d7-h77nx" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:47.328777 env[1215]: 2025-05-10 00:45:47.286 [INFO][3534] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Namespace="calico-system" Pod="calico-kube-controllers-c5cc4b9d7-h77nx" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:47.328777 env[1215]: 2025-05-10 00:45:47.287 [INFO][3534] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Namespace="calico-system" Pod="calico-kube-controllers-c5cc4b9d7-h77nx" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0", GenerateName:"calico-kube-controllers-c5cc4b9d7-", Namespace:"calico-system", SelfLink:"", UID:"717a7e75-4b38-438f-a17d-8863eee7015a", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c5cc4b9d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622", Pod:"calico-kube-controllers-c5cc4b9d7-h77nx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic784db14222", MAC:"2e:1b:a6:3c:e3:23", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:47.328777 env[1215]: 2025-05-10 00:45:47.301 [INFO][3534] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Namespace="calico-system" Pod="calico-kube-controllers-c5cc4b9d7-h77nx" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.111 [INFO][3542] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.135 [INFO][3542] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0 csi-node-driver- calico-system 59ed8057-dfcb-47c2-9e56-afc23d0a505f 777 0 2025-05-10 00:45:20 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb csi-node-driver-nv9sq eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali7c942440a10 [] []}} ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Namespace="calico-system" Pod="csi-node-driver-nv9sq" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.135 [INFO][3542] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Namespace="calico-system" Pod="csi-node-driver-nv9sq" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.207 [INFO][3566] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" HandleID="k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.230 [INFO][3566] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" HandleID="k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003127a0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", "pod":"csi-node-driver-nv9sq", "timestamp":"2025-05-10 00:45:47.207096139 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.230 [INFO][3566] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.230 [INFO][3566] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.230 [INFO][3566] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.234 [INFO][3566] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.243 [INFO][3566] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.250 [INFO][3566] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.254 [INFO][3566] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.266 [INFO][3566] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.266 [INFO][3566] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.278 [INFO][3566] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.286 [INFO][3566] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.296 [INFO][3566] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.66/26] block=192.168.5.64/26 handle="k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.296 [INFO][3566] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.66/26] handle="k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.296 [INFO][3566] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:47.342539 env[1215]: 2025-05-10 00:45:47.296 [INFO][3566] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.66/26] IPv6=[] ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" HandleID="k8s-pod-network.772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:47.343974 env[1215]: 2025-05-10 00:45:47.302 [INFO][3542] cni-plugin/k8s.go 386: Populated endpoint ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Namespace="calico-system" Pod="csi-node-driver-nv9sq" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59ed8057-dfcb-47c2-9e56-afc23d0a505f", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"", Pod:"csi-node-driver-nv9sq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7c942440a10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:47.343974 env[1215]: 2025-05-10 00:45:47.302 [INFO][3542] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.66/32] ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Namespace="calico-system" Pod="csi-node-driver-nv9sq" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:47.343974 env[1215]: 2025-05-10 00:45:47.302 [INFO][3542] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali7c942440a10 ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Namespace="calico-system" Pod="csi-node-driver-nv9sq" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:47.343974 env[1215]: 2025-05-10 00:45:47.315 [INFO][3542] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Namespace="calico-system" Pod="csi-node-driver-nv9sq" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:47.343974 env[1215]: 2025-05-10 00:45:47.316 [INFO][3542] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Namespace="calico-system" Pod="csi-node-driver-nv9sq" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59ed8057-dfcb-47c2-9e56-afc23d0a505f", ResourceVersion:"777", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b", Pod:"csi-node-driver-nv9sq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7c942440a10", MAC:"12:b8:79:46:f6:f7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:47.343974 env[1215]: 2025-05-10 00:45:47.340 [INFO][3542] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b" Namespace="calico-system" Pod="csi-node-driver-nv9sq" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:45:47.369303 env[1215]: time="2025-05-10T00:45:47.369021194Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:47.369303 env[1215]: time="2025-05-10T00:45:47.369077808Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:47.369303 env[1215]: time="2025-05-10T00:45:47.369097323Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:47.369679 env[1215]: time="2025-05-10T00:45:47.369359595Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622 pid=3611 runtime=io.containerd.runc.v2 May 10 00:45:47.372658 env[1215]: time="2025-05-10T00:45:47.372570087Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:47.372658 env[1215]: time="2025-05-10T00:45:47.372621256Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:47.373104 env[1215]: time="2025-05-10T00:45:47.372641574Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:47.373274 env[1215]: time="2025-05-10T00:45:47.373138239Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b pid=3612 runtime=io.containerd.runc.v2 May 10 00:45:47.396427 systemd[1]: Started cri-containerd-772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b.scope. May 10 00:45:47.405945 systemd[1]: Started cri-containerd-4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622.scope. May 10 00:45:47.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.444275 kernel: kauditd_printk_skb: 68 callbacks suppressed May 10 00:45:47.444440 kernel: audit: type=1400 audit(1746837947.434:983): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.483120 kernel: audit: type=1400 audit(1746837947.434:984): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.511821 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:47.512007 kernel: audit: type=1400 audit(1746837947.434:985): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.512050 kernel: audit: audit_lost=30 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:45:47.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.522997 kernel: audit: backlog limit exceeded May 10 00:45:47.538600 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:47.538770 kernel: audit: audit_lost=31 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:45:47.538831 kernel: audit: backlog limit exceeded May 10 00:45:47.563646 kernel: audit: type=1400 audit(1746837947.434:986): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.434000 audit: BPF prog-id=142 op=LOAD May 10 00:45:47.454000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3611 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363665616532646266613933343032346339386330313932646166 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3611 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363665616532646266613933343032346339386330313932646166 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.481000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.481000 audit: BPF prog-id=143 op=LOAD May 10 00:45:47.483000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.483000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=3612 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326366313430316630666432633338373963316361313539633738 May 10 00:45:47.483000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.483000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=3612 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.483000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326366313430316630666432633338373963316361313539633738 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit: BPF prog-id=144 op=LOAD May 10 00:45:47.484000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000316540 items=0 ppid=3612 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326366313430316630666432633338373963316361313539633738 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.484000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.454000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024380 items=0 ppid=3611 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.454000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363665616532646266613933343032346339386330313932646166 May 10 00:45:47.571000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.571000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.571000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.571000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.571000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.571000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000243c8 items=0 ppid=3611 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363665616532646266613933343032346339386330313932646166 May 10 00:45:47.572000 audit: BPF prog-id=147 op=UNLOAD May 10 00:45:47.572000 audit: BPF prog-id=145 op=UNLOAD May 10 00:45:47.572000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { perfmon } for pid=3630 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit[3630]: AVC avc: denied { bpf } for pid=3630 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.572000 audit: BPF prog-id=148 op=LOAD May 10 00:45:47.572000 audit[3630]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000247d8 items=0 ppid=3611 pid=3630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431363665616532646266613933343032346339386330313932646166 May 10 00:45:47.484000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000316588 items=0 ppid=3612 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326366313430316630666432633338373963316361313539633738 May 10 00:45:47.573000 audit: BPF prog-id=146 op=UNLOAD May 10 00:45:47.573000 audit: BPF prog-id=144 op=UNLOAD May 10 00:45:47.573000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { perfmon } for pid=3629 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit[3629]: AVC avc: denied { bpf } for pid=3629 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:47.573000 audit: BPF prog-id=149 op=LOAD May 10 00:45:47.573000 audit[3629]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000316998 items=0 ppid=3612 pid=3629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:47.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737326366313430316630666432633338373963316361313539633738 May 10 00:45:47.607541 env[1215]: time="2025-05-10T00:45:47.607471817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nv9sq,Uid:59ed8057-dfcb-47c2-9e56-afc23d0a505f,Namespace:calico-system,Attempt:1,} returns sandbox id \"772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b\"" May 10 00:45:47.610777 env[1215]: time="2025-05-10T00:45:47.610721271Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 00:45:47.645444 env[1215]: time="2025-05-10T00:45:47.645376761Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c5cc4b9d7-h77nx,Uid:717a7e75-4b38-438f-a17d-8863eee7015a,Namespace:calico-system,Attempt:1,} returns sandbox id \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\"" May 10 00:45:47.803056 env[1215]: time="2025-05-10T00:45:47.802908020Z" level=info msg="StopPodSandbox for \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\"" May 10 00:45:47.805296 env[1215]: time="2025-05-10T00:45:47.805250133Z" level=info msg="StopPodSandbox for \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\"" May 10 00:45:47.806597 env[1215]: time="2025-05-10T00:45:47.806554949Z" level=info msg="StopPodSandbox for \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\"" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:47.953 [INFO][3753] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:47.953 [INFO][3753] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" iface="eth0" netns="/var/run/netns/cni-c5e5e3f5-0aaa-ad6f-81cc-cd66015f3cb1" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:47.953 [INFO][3753] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" iface="eth0" netns="/var/run/netns/cni-c5e5e3f5-0aaa-ad6f-81cc-cd66015f3cb1" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:47.954 [INFO][3753] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" iface="eth0" netns="/var/run/netns/cni-c5e5e3f5-0aaa-ad6f-81cc-cd66015f3cb1" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:47.954 [INFO][3753] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:47.954 [INFO][3753] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:48.037 [INFO][3763] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:48.038 [INFO][3763] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:48.038 [INFO][3763] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:48.048 [WARNING][3763] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:48.049 [INFO][3763] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:48.051 [INFO][3763] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:48.061997 env[1215]: 2025-05-10 00:45:48.060 [INFO][3753] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:48.067625 systemd[1]: run-netns-cni\x2dc5e5e3f5\x2d0aaa\x2dad6f\x2d81cc\x2dcd66015f3cb1.mount: Deactivated successfully. May 10 00:45:48.070845 env[1215]: time="2025-05-10T00:45:48.070780493Z" level=info msg="TearDown network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\" successfully" May 10 00:45:48.071029 env[1215]: time="2025-05-10T00:45:48.070996162Z" level=info msg="StopPodSandbox for \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\" returns successfully" May 10 00:45:48.072536 env[1215]: time="2025-05-10T00:45:48.072479389Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-6zhnn,Uid:8c4cdfb5-cee1-4888-853f-5335203970a8,Namespace:kube-system,Attempt:1,}" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:47.985 [INFO][3740] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:47.986 [INFO][3740] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" iface="eth0" netns="/var/run/netns/cni-5b3a961b-031a-e453-b768-cc79e50c39a0" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:47.986 [INFO][3740] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" iface="eth0" netns="/var/run/netns/cni-5b3a961b-031a-e453-b768-cc79e50c39a0" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:47.987 [INFO][3740] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" iface="eth0" netns="/var/run/netns/cni-5b3a961b-031a-e453-b768-cc79e50c39a0" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:47.987 [INFO][3740] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:47.987 [INFO][3740] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:48.121 [INFO][3768] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:48.121 [INFO][3768] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:48.122 [INFO][3768] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:48.138 [WARNING][3768] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:48.138 [INFO][3768] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:48.141 [INFO][3768] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:48.145044 env[1215]: 2025-05-10 00:45:48.143 [INFO][3740] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:45:48.150639 systemd[1]: run-netns-cni\x2d5b3a961b\x2d031a\x2de453\x2db768\x2dcc79e50c39a0.mount: Deactivated successfully. May 10 00:45:48.153550 env[1215]: time="2025-05-10T00:45:48.153444503Z" level=info msg="TearDown network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\" successfully" May 10 00:45:48.153739 env[1215]: time="2025-05-10T00:45:48.153706595Z" level=info msg="StopPodSandbox for \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\" returns successfully" May 10 00:45:48.155675 env[1215]: time="2025-05-10T00:45:48.155568074Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-p768n,Uid:8760e388-ade0-4878-aa30-3b32b709df01,Namespace:kube-system,Attempt:1,}" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:47.994 [INFO][3738] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:47.995 [INFO][3738] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" iface="eth0" netns="/var/run/netns/cni-06a6cee9-9e2a-30dd-6263-97954a547cfa" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:47.995 [INFO][3738] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" iface="eth0" netns="/var/run/netns/cni-06a6cee9-9e2a-30dd-6263-97954a547cfa" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:47.995 [INFO][3738] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" iface="eth0" netns="/var/run/netns/cni-06a6cee9-9e2a-30dd-6263-97954a547cfa" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:47.995 [INFO][3738] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:47.995 [INFO][3738] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:48.122 [INFO][3770] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:48.122 [INFO][3770] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:48.141 [INFO][3770] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:48.171 [WARNING][3770] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:48.171 [INFO][3770] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:48.174 [INFO][3770] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:48.180538 env[1215]: 2025-05-10 00:45:48.178 [INFO][3738] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:45:48.181700 env[1215]: time="2025-05-10T00:45:48.181616440Z" level=info msg="TearDown network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\" successfully" May 10 00:45:48.182049 env[1215]: time="2025-05-10T00:45:48.181977683Z" level=info msg="StopPodSandbox for \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\" returns successfully" May 10 00:45:48.183466 env[1215]: time="2025-05-10T00:45:48.183424243Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8656cd8877-b6k55,Uid:e9284258-7d98-4c92-a4ab-848849f17105,Namespace:calico-apiserver,Attempt:1,}" May 10 00:45:48.442255 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:45:48.445724 systemd-networkd[1024]: cali6b4f49f9d70: Link UP May 10 00:45:48.452427 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b4f49f9d70: link becomes ready May 10 00:45:48.454172 systemd-networkd[1024]: cali6b4f49f9d70: Gained carrier May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.199 [INFO][3779] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.227 [INFO][3779] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0 coredns-7db6d8ff4d- kube-system 8c4cdfb5-cee1-4888-853f-5335203970a8 792 0 2025-05-10 00:45:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb coredns-7db6d8ff4d-6zhnn eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali6b4f49f9d70 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Namespace="kube-system" Pod="coredns-7db6d8ff4d-6zhnn" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.227 [INFO][3779] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Namespace="kube-system" Pod="coredns-7db6d8ff4d-6zhnn" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.343 [INFO][3824] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" HandleID="k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.369 [INFO][3824] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" HandleID="k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011d730), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", "pod":"coredns-7db6d8ff4d-6zhnn", "timestamp":"2025-05-10 00:45:48.338993883 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.369 [INFO][3824] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.370 [INFO][3824] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.370 [INFO][3824] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.376 [INFO][3824] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.384 [INFO][3824] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.393 [INFO][3824] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.398 [INFO][3824] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.408 [INFO][3824] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.408 [INFO][3824] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.411 [INFO][3824] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.420 [INFO][3824] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.427 [INFO][3824] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.67/26] block=192.168.5.64/26 handle="k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.428 [INFO][3824] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.67/26] handle="k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.428 [INFO][3824] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:48.479458 env[1215]: 2025-05-10 00:45:48.429 [INFO][3824] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.67/26] IPv6=[] ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" HandleID="k8s-pod-network.129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.480700 env[1215]: 2025-05-10 00:45:48.433 [INFO][3779] cni-plugin/k8s.go 386: Populated endpoint ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Namespace="kube-system" Pod="coredns-7db6d8ff4d-6zhnn" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8c4cdfb5-cee1-4888-853f-5335203970a8", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"", Pod:"coredns-7db6d8ff4d-6zhnn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b4f49f9d70", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:48.480700 env[1215]: 2025-05-10 00:45:48.433 [INFO][3779] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.67/32] ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Namespace="kube-system" Pod="coredns-7db6d8ff4d-6zhnn" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.480700 env[1215]: 2025-05-10 00:45:48.433 [INFO][3779] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali6b4f49f9d70 ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Namespace="kube-system" Pod="coredns-7db6d8ff4d-6zhnn" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.480700 env[1215]: 2025-05-10 00:45:48.454 [INFO][3779] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Namespace="kube-system" Pod="coredns-7db6d8ff4d-6zhnn" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.480700 env[1215]: 2025-05-10 00:45:48.454 [INFO][3779] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Namespace="kube-system" Pod="coredns-7db6d8ff4d-6zhnn" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8c4cdfb5-cee1-4888-853f-5335203970a8", ResourceVersion:"792", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db", Pod:"coredns-7db6d8ff4d-6zhnn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b4f49f9d70", MAC:"fa:db:3a:93:c5:29", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:48.480700 env[1215]: 2025-05-10 00:45:48.476 [INFO][3779] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db" Namespace="kube-system" Pod="coredns-7db6d8ff4d-6zhnn" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:48.527892 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali495b0cd11bb: link becomes ready May 10 00:45:48.529773 systemd-networkd[1024]: cali495b0cd11bb: Link UP May 10 00:45:48.530153 systemd-networkd[1024]: cali495b0cd11bb: Gained carrier May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.296 [INFO][3811] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.313 [INFO][3811] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0 calico-apiserver-8656cd8877- calico-apiserver e9284258-7d98-4c92-a4ab-848849f17105 794 0 2025-05-10 00:45:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8656cd8877 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb calico-apiserver-8656cd8877-b6k55 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali495b0cd11bb [] []}} ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-b6k55" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.314 [INFO][3811] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-b6k55" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.394 [INFO][3833] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.419 [INFO][3833] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312a40), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", "pod":"calico-apiserver-8656cd8877-b6k55", "timestamp":"2025-05-10 00:45:48.394804637 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.419 [INFO][3833] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.436 [INFO][3833] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.436 [INFO][3833] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.438 [INFO][3833] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.444 [INFO][3833] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.465 [INFO][3833] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.479 [INFO][3833] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.484 [INFO][3833] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.484 [INFO][3833] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.487 [INFO][3833] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6 May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.497 [INFO][3833] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.509 [INFO][3833] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.68/26] block=192.168.5.64/26 handle="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.509 [INFO][3833] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.68/26] handle="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.510 [INFO][3833] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:48.567500 env[1215]: 2025-05-10 00:45:48.510 [INFO][3833] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.68/26] IPv6=[] ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.568905 env[1215]: 2025-05-10 00:45:48.517 [INFO][3811] cni-plugin/k8s.go 386: Populated endpoint ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-b6k55" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0", GenerateName:"calico-apiserver-8656cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"e9284258-7d98-4c92-a4ab-848849f17105", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8656cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"", Pod:"calico-apiserver-8656cd8877-b6k55", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali495b0cd11bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:48.568905 env[1215]: 2025-05-10 00:45:48.517 [INFO][3811] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.68/32] ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-b6k55" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.568905 env[1215]: 2025-05-10 00:45:48.517 [INFO][3811] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali495b0cd11bb ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-b6k55" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.568905 env[1215]: 2025-05-10 00:45:48.538 [INFO][3811] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-b6k55" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.568905 env[1215]: 2025-05-10 00:45:48.543 [INFO][3811] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-b6k55" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0", GenerateName:"calico-apiserver-8656cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"e9284258-7d98-4c92-a4ab-848849f17105", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8656cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6", Pod:"calico-apiserver-8656cd8877-b6k55", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali495b0cd11bb", MAC:"36:8e:5c:4c:4b:32", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:48.568905 env[1215]: 2025-05-10 00:45:48.565 [INFO][3811] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-b6k55" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:45:48.626155 env[1215]: time="2025-05-10T00:45:48.626066989Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:48.626529 env[1215]: time="2025-05-10T00:45:48.626120942Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:48.626529 env[1215]: time="2025-05-10T00:45:48.626140396Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:48.626529 env[1215]: time="2025-05-10T00:45:48.626441359Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db pid=3873 runtime=io.containerd.runc.v2 May 10 00:45:48.665302 systemd[1]: Started cri-containerd-129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db.scope. May 10 00:45:48.693498 systemd-networkd[1024]: cali01af897f6b9: Link UP May 10 00:45:48.703295 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali01af897f6b9: link becomes ready May 10 00:45:48.704649 systemd-networkd[1024]: cali01af897f6b9: Gained carrier May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.314 [INFO][3798] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.340 [INFO][3798] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0 coredns-7db6d8ff4d- kube-system 8760e388-ade0-4878-aa30-3b32b709df01 793 0 2025-05-10 00:45:14 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb coredns-7db6d8ff4d-p768n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali01af897f6b9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-p768n" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.341 [INFO][3798] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-p768n" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.586 [INFO][3840] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" HandleID="k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.609 [INFO][3840] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" HandleID="k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004b3b40), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", "pod":"coredns-7db6d8ff4d-p768n", "timestamp":"2025-05-10 00:45:48.586131523 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.609 [INFO][3840] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.610 [INFO][3840] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.610 [INFO][3840] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.616 [INFO][3840] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.624 [INFO][3840] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.632 [INFO][3840] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.639 [INFO][3840] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.643 [INFO][3840] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.643 [INFO][3840] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.648 [INFO][3840] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7 May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.654 [INFO][3840] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.668 [INFO][3840] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.69/26] block=192.168.5.64/26 handle="k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.668 [INFO][3840] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.69/26] handle="k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.668 [INFO][3840] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:48.737296 env[1215]: 2025-05-10 00:45:48.668 [INFO][3840] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.69/26] IPv6=[] ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" HandleID="k8s-pod-network.dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.738619 env[1215]: 2025-05-10 00:45:48.680 [INFO][3798] cni-plugin/k8s.go 386: Populated endpoint ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-p768n" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8760e388-ade0-4878-aa30-3b32b709df01", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"", Pod:"coredns-7db6d8ff4d-p768n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali01af897f6b9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:48.738619 env[1215]: 2025-05-10 00:45:48.680 [INFO][3798] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.69/32] ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-p768n" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.738619 env[1215]: 2025-05-10 00:45:48.680 [INFO][3798] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali01af897f6b9 ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-p768n" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.738619 env[1215]: 2025-05-10 00:45:48.711 [INFO][3798] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-p768n" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.738619 env[1215]: 2025-05-10 00:45:48.712 [INFO][3798] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-p768n" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8760e388-ade0-4878-aa30-3b32b709df01", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7", Pod:"coredns-7db6d8ff4d-p768n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali01af897f6b9", MAC:"3a:56:78:47:22:1b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:48.738619 env[1215]: 2025-05-10 00:45:48.734 [INFO][3798] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7" Namespace="kube-system" Pod="coredns-7db6d8ff4d-p768n" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:45:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.750000 audit: BPF prog-id=150 op=LOAD May 10 00:45:48.755606 env[1215]: time="2025-05-10T00:45:48.755475240Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:48.755606 env[1215]: time="2025-05-10T00:45:48.755542516Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:48.753000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.753000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3873 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396165616335336162363435653732643137393433356630643432 May 10 00:45:48.753000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.753000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3873 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396165616335336162363435653732643137393433356630643432 May 10 00:45:48.756578 env[1215]: time="2025-05-10T00:45:48.756513026Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757966 env[1215]: time="2025-05-10T00:45:48.757898640Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6 pid=3916 runtime=io.containerd.runc.v2 May 10 00:45:48.755000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.755000 audit: BPF prog-id=151 op=LOAD May 10 00:45:48.755000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ccc00 items=0 ppid=3873 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.755000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396165616335336162363435653732643137393433356630643432 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.757000 audit: BPF prog-id=152 op=LOAD May 10 00:45:48.757000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001ccc48 items=0 ppid=3873 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.757000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396165616335336162363435653732643137393433356630643432 May 10 00:45:48.760000 audit: BPF prog-id=152 op=UNLOAD May 10 00:45:48.760000 audit: BPF prog-id=151 op=UNLOAD May 10 00:45:48.760000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { perfmon } for pid=3885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit[3885]: AVC avc: denied { bpf } for pid=3885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.760000 audit: BPF prog-id=153 op=LOAD May 10 00:45:48.760000 audit[3885]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001cd058 items=0 ppid=3873 pid=3885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.760000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132396165616335336162363435653732643137393433356630643432 May 10 00:45:48.832748 systemd[1]: Started cri-containerd-e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6.scope. May 10 00:45:48.846967 env[1215]: time="2025-05-10T00:45:48.842053307Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:48.846967 env[1215]: time="2025-05-10T00:45:48.842183604Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:48.846967 env[1215]: time="2025-05-10T00:45:48.842209503Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:48.846967 env[1215]: time="2025-05-10T00:45:48.842614839Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7 pid=3947 runtime=io.containerd.runc.v2 May 10 00:45:48.885805 systemd[1]: Started cri-containerd-dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7.scope. May 10 00:45:48.911396 env[1215]: time="2025-05-10T00:45:48.911287866Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-6zhnn,Uid:8c4cdfb5-cee1-4888-853f-5335203970a8,Namespace:kube-system,Attempt:1,} returns sandbox id \"129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db\"" May 10 00:45:48.935115 systemd-networkd[1024]: cali7c942440a10: Gained IPv6LL May 10 00:45:48.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.947000 audit: BPF prog-id=154 op=LOAD May 10 00:45:48.950266 env[1215]: time="2025-05-10T00:45:48.948322504Z" level=info msg="CreateContainer within sandbox \"129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:45:48.950000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.950000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3947 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623033316535636364633835653037653437636335303262376633 May 10 00:45:48.950000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.950000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3947 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.950000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623033316535636364633835653037653437636335303262376633 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit: BPF prog-id=155 op=LOAD May 10 00:45:48.952000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025ef0 items=0 ppid=3947 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623033316535636364633835653037653437636335303262376633 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit: BPF prog-id=156 op=LOAD May 10 00:45:48.952000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000025f38 items=0 ppid=3947 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623033316535636364633835653037653437636335303262376633 May 10 00:45:48.952000 audit: BPF prog-id=156 op=UNLOAD May 10 00:45:48.952000 audit: BPF prog-id=155 op=UNLOAD May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:48.952000 audit: BPF prog-id=157 op=LOAD May 10 00:45:48.952000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002ee348 items=0 ppid=3947 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:48.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466623033316535636364633835653037653437636335303262376633 May 10 00:45:48.989906 systemd[1]: run-netns-cni\x2d06a6cee9\x2d9e2a\x2d30dd\x2d6263\x2d97954a547cfa.mount: Deactivated successfully. May 10 00:45:48.992827 systemd-networkd[1024]: calic784db14222: Gained IPv6LL May 10 00:45:49.042635 env[1215]: time="2025-05-10T00:45:49.042574446Z" level=info msg="CreateContainer within sandbox \"129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"330596d78eeef4c488b8dbed897e0f8d9642a052f34af733160aefc6592ef7ef\"" May 10 00:45:49.044017 env[1215]: time="2025-05-10T00:45:49.043974303Z" level=info msg="StartContainer for \"330596d78eeef4c488b8dbed897e0f8d9642a052f34af733160aefc6592ef7ef\"" May 10 00:45:49.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.100000 audit: BPF prog-id=158 op=LOAD May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3916 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333462343230613765633364366533653134613238373364326233 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3916 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333462343230613765633364366533653134613238373364326233 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit: BPF prog-id=159 op=LOAD May 10 00:45:49.101000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003d29d0 items=0 ppid=3916 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333462343230613765633364366533653134613238373364326233 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit: BPF prog-id=160 op=LOAD May 10 00:45:49.101000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003d2a18 items=0 ppid=3916 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333462343230613765633364366533653134613238373364326233 May 10 00:45:49.101000 audit: BPF prog-id=160 op=UNLOAD May 10 00:45:49.101000 audit: BPF prog-id=159 op=UNLOAD May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.101000 audit: BPF prog-id=161 op=LOAD May 10 00:45:49.101000 audit[3937]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d2e28 items=0 ppid=3916 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6539333462343230613765633364366533653134613238373364326233 May 10 00:45:49.117452 env[1215]: time="2025-05-10T00:45:49.117390921Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-p768n,Uid:8760e388-ade0-4878-aa30-3b32b709df01,Namespace:kube-system,Attempt:1,} returns sandbox id \"dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7\"" May 10 00:45:49.125261 env[1215]: time="2025-05-10T00:45:49.124357278Z" level=info msg="CreateContainer within sandbox \"dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 00:45:49.187181 systemd[1]: Started cri-containerd-330596d78eeef4c488b8dbed897e0f8d9642a052f34af733160aefc6592ef7ef.scope. May 10 00:45:49.191799 env[1215]: time="2025-05-10T00:45:49.191739349Z" level=info msg="CreateContainer within sandbox \"dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"7e81c8520ba3bde7140f59d08e7f85e9a4a0f24dac0dc9fcb1699a5d7e0868e9\"" May 10 00:45:49.197461 env[1215]: time="2025-05-10T00:45:49.197408730Z" level=info msg="StartContainer for \"7e81c8520ba3bde7140f59d08e7f85e9a4a0f24dac0dc9fcb1699a5d7e0868e9\"" May 10 00:45:49.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.255000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.255000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.256000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.256000 audit: BPF prog-id=162 op=LOAD May 10 00:45:49.257000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3873 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303539366437386565656634633438386238646265643839376530 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3873 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303539366437386565656634633438386238646265643839376530 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.257000 audit: BPF prog-id=163 op=LOAD May 10 00:45:49.257000 audit[4017]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000229230 items=0 ppid=3873 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303539366437386565656634633438386238646265643839376530 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit: BPF prog-id=164 op=LOAD May 10 00:45:49.258000 audit[4017]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000229278 items=0 ppid=3873 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303539366437386565656634633438386238646265643839376530 May 10 00:45:49.258000 audit: BPF prog-id=164 op=UNLOAD May 10 00:45:49.258000 audit: BPF prog-id=163 op=UNLOAD May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { perfmon } for pid=4017 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit[4017]: AVC avc: denied { bpf } for pid=4017 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.258000 audit: BPF prog-id=165 op=LOAD May 10 00:45:49.258000 audit[4017]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000229688 items=0 ppid=3873 pid=4017 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.258000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333303539366437386565656634633438386238646265643839376530 May 10 00:45:49.264651 kubelet[2110]: I0510 00:45:49.253125 2110 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:49.277502 systemd[1]: Started cri-containerd-7e81c8520ba3bde7140f59d08e7f85e9a4a0f24dac0dc9fcb1699a5d7e0868e9.scope. May 10 00:45:49.308456 env[1215]: time="2025-05-10T00:45:49.308379572Z" level=info msg="StartContainer for \"330596d78eeef4c488b8dbed897e0f8d9642a052f34af733160aefc6592ef7ef\" returns successfully" May 10 00:45:49.332493 env[1215]: time="2025-05-10T00:45:49.332437203Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8656cd8877-b6k55,Uid:e9284258-7d98-4c92-a4ab-848849f17105,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\"" May 10 00:45:49.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.342000 audit: BPF prog-id=166 op=LOAD May 10 00:45:49.344000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.344000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3947 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383163383532306261336264653731343066353964303865376638 May 10 00:45:49.344000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.344000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3947 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.344000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383163383532306261336264653731343066353964303865376638 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.345000 audit: BPF prog-id=167 op=LOAD May 10 00:45:49.345000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000091280 items=0 ppid=3947 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383163383532306261336264653731343066353964303865376638 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.346000 audit: BPF prog-id=168 op=LOAD May 10 00:45:49.346000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000912c8 items=0 ppid=3947 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383163383532306261336264653731343066353964303865376638 May 10 00:45:49.348000 audit: BPF prog-id=168 op=UNLOAD May 10 00:45:49.348000 audit: BPF prog-id=167 op=UNLOAD May 10 00:45:49.348000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { perfmon } for pid=4043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit[4043]: AVC avc: denied { bpf } for pid=4043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.348000 audit: BPF prog-id=169 op=LOAD May 10 00:45:49.348000 audit[4043]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000916d8 items=0 ppid=3947 pid=4043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.348000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765383163383532306261336264653731343066353964303865376638 May 10 00:45:49.411974 env[1215]: time="2025-05-10T00:45:49.411889186Z" level=info msg="StartContainer for \"7e81c8520ba3bde7140f59d08e7f85e9a4a0f24dac0dc9fcb1699a5d7e0868e9\" returns successfully" May 10 00:45:49.454904 kubelet[2110]: I0510 00:45:49.454856 2110 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:49.675889 env[1215]: time="2025-05-10T00:45:49.675741891Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:49.681001 env[1215]: time="2025-05-10T00:45:49.680933833Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:49.683418 env[1215]: time="2025-05-10T00:45:49.683355273Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:49.686120 env[1215]: time="2025-05-10T00:45:49.686047055Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:49.686610 env[1215]: time="2025-05-10T00:45:49.686564391Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 00:45:49.691174 env[1215]: time="2025-05-10T00:45:49.691122829Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 00:45:49.693673 env[1215]: time="2025-05-10T00:45:49.693616700Z" level=info msg="CreateContainer within sandbox \"772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 00:45:49.718936 env[1215]: time="2025-05-10T00:45:49.718871049Z" level=info msg="CreateContainer within sandbox \"772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"18d45656eda09c7586ef1c8df7407a4ef9b3a388a189f890f091c017416e4fc9\"" May 10 00:45:49.720353 env[1215]: time="2025-05-10T00:45:49.720304285Z" level=info msg="StartContainer for \"18d45656eda09c7586ef1c8df7407a4ef9b3a388a189f890f091c017416e4fc9\"" May 10 00:45:49.759000 audit[4113]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=4113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:49.759000 audit[4113]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffda08f4800 a2=0 a3=7ffda08f47ec items=0 ppid=2301 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.759000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:49.764543 systemd[1]: Started cri-containerd-18d45656eda09c7586ef1c8df7407a4ef9b3a388a189f890f091c017416e4fc9.scope. May 10 00:45:49.769000 audit[4113]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=4113 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:49.769000 audit[4113]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffda08f4800 a2=0 a3=7ffda08f47ec items=0 ppid=2301 pid=4113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.769000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:49.801820 env[1215]: time="2025-05-10T00:45:49.801755831Z" level=info msg="StopPodSandbox for \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\"" May 10 00:45:49.804077 env[1215]: time="2025-05-10T00:45:49.804030013Z" level=info msg="StopPodSandbox for \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\"" May 10 00:45:49.885000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.885000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=7efc9433bf08 items=0 ppid=3612 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.885000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643435363536656461303963373538366566316338646637343037 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.886000 audit: BPF prog-id=170 op=LOAD May 10 00:45:49.886000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003e4078 items=0 ppid=3612 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643435363536656461303963373538366566316338646637343037 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.888000 audit: BPF prog-id=171 op=LOAD May 10 00:45:49.888000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003e40c8 items=0 ppid=3612 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643435363536656461303963373538366566316338646637343037 May 10 00:45:49.890000 audit: BPF prog-id=171 op=UNLOAD May 10 00:45:49.890000 audit: BPF prog-id=170 op=UNLOAD May 10 00:45:49.890000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { perfmon } for pid=4123 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit[4123]: AVC avc: denied { bpf } for pid=4123 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:49.890000 audit: BPF prog-id=172 op=LOAD May 10 00:45:49.890000 audit[4123]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003e4158 items=0 ppid=3612 pid=4123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:49.890000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138643435363536656461303963373538366566316338646637343037 May 10 00:45:49.963760 env[1215]: time="2025-05-10T00:45:49.963706951Z" level=info msg="StartContainer for \"18d45656eda09c7586ef1c8df7407a4ef9b3a388a189f890f091c017416e4fc9\" returns successfully" May 10 00:45:49.984261 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount248980789.mount: Deactivated successfully. May 10 00:45:50.020325 systemd-networkd[1024]: cali495b0cd11bb: Gained IPv6LL May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:49.957 [INFO][4176] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:49.957 [INFO][4176] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" iface="eth0" netns="/var/run/netns/cni-eae77249-e416-94f7-3bb5-49d6419e7e0a" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:49.964 [INFO][4176] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" iface="eth0" netns="/var/run/netns/cni-eae77249-e416-94f7-3bb5-49d6419e7e0a" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:49.971 [INFO][4176] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" iface="eth0" netns="/var/run/netns/cni-eae77249-e416-94f7-3bb5-49d6419e7e0a" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:49.971 [INFO][4176] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:49.971 [INFO][4176] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:50.054 [INFO][4200] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:50.055 [INFO][4200] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:50.055 [INFO][4200] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:50.079 [WARNING][4200] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:50.079 [INFO][4200] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:50.089 [INFO][4200] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:50.099738 env[1215]: 2025-05-10 00:45:50.091 [INFO][4176] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:45:50.098047 systemd[1]: run-netns-cni\x2deae77249\x2de416\x2d94f7\x2d3bb5\x2d49d6419e7e0a.mount: Deactivated successfully. May 10 00:45:50.100720 env[1215]: time="2025-05-10T00:45:50.099744499Z" level=info msg="TearDown network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\" successfully" May 10 00:45:50.100720 env[1215]: time="2025-05-10T00:45:50.099786436Z" level=info msg="StopPodSandbox for \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\" returns successfully" May 10 00:45:50.100839 env[1215]: time="2025-05-10T00:45:50.100746312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8656cd8877-tqhzm,Uid:58f0c618-8c39-4fc5-9de2-84bc9752ee7c,Namespace:calico-apiserver,Attempt:1,}" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.004 [INFO][4169] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.004 [INFO][4169] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" iface="eth0" netns="/var/run/netns/cni-3a9a190e-978e-6403-32c1-01dcb16077c5" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.005 [INFO][4169] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" iface="eth0" netns="/var/run/netns/cni-3a9a190e-978e-6403-32c1-01dcb16077c5" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.007 [INFO][4169] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" iface="eth0" netns="/var/run/netns/cni-3a9a190e-978e-6403-32c1-01dcb16077c5" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.007 [INFO][4169] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.007 [INFO][4169] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.151 [INFO][4206] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.159 [INFO][4206] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.160 [INFO][4206] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.182 [WARNING][4206] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.182 [INFO][4206] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.187 [INFO][4206] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:50.214356 env[1215]: 2025-05-10 00:45:50.197 [INFO][4169] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:50.214356 env[1215]: time="2025-05-10T00:45:50.211344827Z" level=info msg="TearDown network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\" successfully" May 10 00:45:50.214356 env[1215]: time="2025-05-10T00:45:50.211397634Z" level=info msg="StopPodSandbox for \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\" returns successfully" May 10 00:45:50.214356 env[1215]: time="2025-05-10T00:45:50.212303762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7988f79fb9-8gxhl,Uid:2f8081a2-a538-42ca-bc08-56e312bd1da7,Namespace:calico-apiserver,Attempt:1,}" May 10 00:45:50.211144 systemd[1]: run-netns-cni\x2d3a9a190e\x2d978e\x2d6403\x2d32c1\x2d01dcb16077c5.mount: Deactivated successfully. May 10 00:45:50.261239 kubelet[2110]: I0510 00:45:50.261151 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-6zhnn" podStartSLOduration=36.261123563 podStartE2EDuration="36.261123563s" podCreationTimestamp="2025-05-10 00:45:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:50.203688695 +0000 UTC m=+51.588762381" watchObservedRunningTime="2025-05-10 00:45:50.261123563 +0000 UTC m=+51.646197220" May 10 00:45:50.272381 systemd-networkd[1024]: cali6b4f49f9d70: Gained IPv6LL May 10 00:45:50.333000 audit[4261]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=4261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:50.333000 audit[4261]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc2e3d5d80 a2=0 a3=7ffc2e3d5d6c items=0 ppid=2301 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:50.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:50.339000 audit[4261]: NETFILTER_CFG table=nat:98 family=2 entries=14 op=nft_register_rule pid=4261 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:50.348255 kubelet[2110]: I0510 00:45:50.348151 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-p768n" podStartSLOduration=36.348123129 podStartE2EDuration="36.348123129s" podCreationTimestamp="2025-05-10 00:45:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:45:50.270153471 +0000 UTC m=+51.655227129" watchObservedRunningTime="2025-05-10 00:45:50.348123129 +0000 UTC m=+51.733196785" May 10 00:45:50.339000 audit[4261]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffc2e3d5d80 a2=0 a3=0 items=0 ppid=2301 pid=4261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:50.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:50.528369 systemd-networkd[1024]: cali01af897f6b9: Gained IPv6LL May 10 00:45:50.710281 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali22385cd98f2: link becomes ready May 10 00:45:50.710799 systemd-networkd[1024]: cali22385cd98f2: Link UP May 10 00:45:50.716919 systemd-networkd[1024]: cali22385cd98f2: Gained carrier May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.346 [INFO][4250] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.387 [INFO][4250] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0 calico-apiserver-7988f79fb9- calico-apiserver 2f8081a2-a538-42ca-bc08-56e312bd1da7 827 0 2025-05-10 00:45:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7988f79fb9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb calico-apiserver-7988f79fb9-8gxhl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali22385cd98f2 [] []}} ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Namespace="calico-apiserver" Pod="calico-apiserver-7988f79fb9-8gxhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.387 [INFO][4250] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Namespace="calico-apiserver" Pod="calico-apiserver-7988f79fb9-8gxhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.551 [INFO][4278] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" HandleID="k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.575 [INFO][4278] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" HandleID="k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003878a0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", "pod":"calico-apiserver-7988f79fb9-8gxhl", "timestamp":"2025-05-10 00:45:50.548542507 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.576 [INFO][4278] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.576 [INFO][4278] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.576 [INFO][4278] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.590 [INFO][4278] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.610 [INFO][4278] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.627 [INFO][4278] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.637 [INFO][4278] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.646 [INFO][4278] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.646 [INFO][4278] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.656 [INFO][4278] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594 May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.676 [INFO][4278] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.692 [INFO][4278] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.70/26] block=192.168.5.64/26 handle="k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.692 [INFO][4278] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.70/26] handle="k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.693 [INFO][4278] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:50.782461 env[1215]: 2025-05-10 00:45:50.693 [INFO][4278] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.70/26] IPv6=[] ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" HandleID="k8s-pod-network.13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.783768 env[1215]: 2025-05-10 00:45:50.695 [INFO][4250] cni-plugin/k8s.go 386: Populated endpoint ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Namespace="calico-apiserver" Pod="calico-apiserver-7988f79fb9-8gxhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0", GenerateName:"calico-apiserver-7988f79fb9-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f8081a2-a538-42ca-bc08-56e312bd1da7", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7988f79fb9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"", Pod:"calico-apiserver-7988f79fb9-8gxhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali22385cd98f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:50.783768 env[1215]: 2025-05-10 00:45:50.695 [INFO][4250] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.70/32] ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Namespace="calico-apiserver" Pod="calico-apiserver-7988f79fb9-8gxhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.783768 env[1215]: 2025-05-10 00:45:50.695 [INFO][4250] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali22385cd98f2 ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Namespace="calico-apiserver" Pod="calico-apiserver-7988f79fb9-8gxhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.783768 env[1215]: 2025-05-10 00:45:50.701 [INFO][4250] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Namespace="calico-apiserver" Pod="calico-apiserver-7988f79fb9-8gxhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.783768 env[1215]: 2025-05-10 00:45:50.717 [INFO][4250] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Namespace="calico-apiserver" Pod="calico-apiserver-7988f79fb9-8gxhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0", GenerateName:"calico-apiserver-7988f79fb9-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f8081a2-a538-42ca-bc08-56e312bd1da7", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7988f79fb9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594", Pod:"calico-apiserver-7988f79fb9-8gxhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali22385cd98f2", MAC:"b6:5f:7d:f3:3b:d0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:50.783768 env[1215]: 2025-05-10 00:45:50.773 [INFO][4250] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594" Namespace="calico-apiserver" Pod="calico-apiserver-7988f79fb9-8gxhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:50.850685 env[1215]: time="2025-05-10T00:45:50.850588874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:50.851840 env[1215]: time="2025-05-10T00:45:50.851781774Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:50.852096 env[1215]: time="2025-05-10T00:45:50.852053952Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:50.852641 env[1215]: time="2025-05-10T00:45:50.852585058Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594 pid=4322 runtime=io.containerd.runc.v2 May 10 00:45:50.872842 systemd-networkd[1024]: calica725551d10: Link UP May 10 00:45:50.883465 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calica725551d10: link becomes ready May 10 00:45:50.883787 systemd-networkd[1024]: calica725551d10: Gained carrier May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.333 [INFO][4218] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.385 [INFO][4218] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0 calico-apiserver-8656cd8877- calico-apiserver 58f0c618-8c39-4fc5-9de2-84bc9752ee7c 824 0 2025-05-10 00:45:20 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:8656cd8877 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb calico-apiserver-8656cd8877-tqhzm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calica725551d10 [] []}} ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-tqhzm" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.385 [INFO][4218] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-tqhzm" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.517 [INFO][4273] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" HandleID="k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.576 [INFO][4273] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" HandleID="k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313ca0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", "pod":"calico-apiserver-8656cd8877-tqhzm", "timestamp":"2025-05-10 00:45:50.517299411 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.576 [INFO][4273] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.692 [INFO][4273] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.692 [INFO][4273] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.713 [INFO][4273] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.752 [INFO][4273] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.790 [INFO][4273] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.797 [INFO][4273] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.811 [INFO][4273] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.811 [INFO][4273] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.814 [INFO][4273] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4 May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.829 [INFO][4273] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.855 [INFO][4273] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.71/26] block=192.168.5.64/26 handle="k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.855 [INFO][4273] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.71/26] handle="k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.855 [INFO][4273] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:50.918467 env[1215]: 2025-05-10 00:45:50.855 [INFO][4273] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.71/26] IPv6=[] ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" HandleID="k8s-pod-network.9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.920987 env[1215]: 2025-05-10 00:45:50.867 [INFO][4218] cni-plugin/k8s.go 386: Populated endpoint ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-tqhzm" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0", GenerateName:"calico-apiserver-8656cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"58f0c618-8c39-4fc5-9de2-84bc9752ee7c", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8656cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"", Pod:"calico-apiserver-8656cd8877-tqhzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calica725551d10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:50.920987 env[1215]: 2025-05-10 00:45:50.868 [INFO][4218] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.71/32] ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-tqhzm" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.920987 env[1215]: 2025-05-10 00:45:50.868 [INFO][4218] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calica725551d10 ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-tqhzm" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.920987 env[1215]: 2025-05-10 00:45:50.890 [INFO][4218] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-tqhzm" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.920987 env[1215]: 2025-05-10 00:45:50.892 [INFO][4218] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-tqhzm" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0", GenerateName:"calico-apiserver-8656cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"58f0c618-8c39-4fc5-9de2-84bc9752ee7c", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8656cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4", Pod:"calico-apiserver-8656cd8877-tqhzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calica725551d10", MAC:"36:cf:d0:07:d0:64", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:50.920987 env[1215]: 2025-05-10 00:45:50.915 [INFO][4218] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4" Namespace="calico-apiserver" Pod="calico-apiserver-8656cd8877-tqhzm" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:45:50.958598 systemd[1]: Started cri-containerd-13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594.scope. May 10 00:45:51.045795 env[1215]: time="2025-05-10T00:45:51.041453730Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:45:51.045795 env[1215]: time="2025-05-10T00:45:51.041554454Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:45:51.045795 env[1215]: time="2025-05-10T00:45:51.041573712Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:45:51.045795 env[1215]: time="2025-05-10T00:45:51.041800140Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4 pid=4366 runtime=io.containerd.runc.v2 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.098000 audit: BPF prog-id=173 op=LOAD May 10 00:45:51.098000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff5e278170 a2=98 a3=3 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.098000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.098000 audit: BPF prog-id=173 op=UNLOAD May 10 00:45:51.099000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit: BPF prog-id=174 op=LOAD May 10 00:45:51.099000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5e277f50 a2=74 a3=540051 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.099000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.099000 audit: BPF prog-id=174 op=UNLOAD May 10 00:45:51.099000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.099000 audit: BPF prog-id=175 op=LOAD May 10 00:45:51.099000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5e277f80 a2=94 a3=2 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.099000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.099000 audit: BPF prog-id=175 op=UNLOAD May 10 00:45:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.100000 audit: BPF prog-id=176 op=LOAD May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133333038613463653432336664656433643165623339613737343737 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133333038613463653432336664656433643165623339613737343737 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit: BPF prog-id=177 op=LOAD May 10 00:45:51.104000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000366850 items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133333038613463653432336664656433643165623339613737343737 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.104000 audit: BPF prog-id=178 op=LOAD May 10 00:45:51.104000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000366898 items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.104000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133333038613463653432336664656433643165623339613737343737 May 10 00:45:51.105000 audit: BPF prog-id=178 op=UNLOAD May 10 00:45:51.105000 audit: BPF prog-id=177 op=UNLOAD May 10 00:45:51.105000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { perfmon } for pid=4334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit[4334]: AVC avc: denied { bpf } for pid=4334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.105000 audit: BPF prog-id=179 op=LOAD May 10 00:45:51.105000 audit[4334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000366ca8 items=0 ppid=4322 pid=4334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.105000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3133333038613463653432336664656433643165623339613737343737 May 10 00:45:51.170071 systemd[1]: run-containerd-runc-k8s.io-9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4-runc.l5mM1H.mount: Deactivated successfully. May 10 00:45:51.176460 systemd[1]: Started cri-containerd-9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4.scope. May 10 00:45:51.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.262000 audit: BPF prog-id=180 op=LOAD May 10 00:45:51.264000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.264000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4366 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.264000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961386161303131306637613264616639316663383531333333386230 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4366 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961386161303131306637613264616639316663383531333333386230 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.265000 audit: BPF prog-id=181 op=LOAD May 10 00:45:51.265000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001bfda0 items=0 ppid=4366 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.265000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961386161303131306637613264616639316663383531333333386230 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.267000 audit: BPF prog-id=182 op=LOAD May 10 00:45:51.267000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001bfde8 items=0 ppid=4366 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961386161303131306637613264616639316663383531333333386230 May 10 00:45:51.268000 audit: BPF prog-id=182 op=UNLOAD May 10 00:45:51.268000 audit: BPF prog-id=181 op=UNLOAD May 10 00:45:51.268000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { perfmon } for pid=4385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.268000 audit: BPF prog-id=183 op=LOAD May 10 00:45:51.268000 audit[4385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e81f8 items=0 ppid=4366 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961386161303131306637613264616639316663383531333333386230 May 10 00:45:51.315016 env[1215]: time="2025-05-10T00:45:51.314828486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7988f79fb9-8gxhl,Uid:2f8081a2-a538-42ca-bc08-56e312bd1da7,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594\"" May 10 00:45:51.408959 env[1215]: time="2025-05-10T00:45:51.408904602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-8656cd8877-tqhzm,Uid:58f0c618-8c39-4fc5-9de2-84bc9752ee7c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4\"" May 10 00:45:51.412000 audit[4430]: NETFILTER_CFG table=filter:99 family=2 entries=13 op=nft_register_rule pid=4430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:51.412000 audit[4430]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffea8f192f0 a2=0 a3=7ffea8f192dc items=0 ppid=2301 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.412000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:51.440000 audit[4430]: NETFILTER_CFG table=nat:100 family=2 entries=47 op=nft_register_chain pid=4430 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:51.440000 audit[4430]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffea8f192f0 a2=0 a3=7ffea8f192dc items=0 ppid=2301 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.730000 audit: BPF prog-id=184 op=LOAD May 10 00:45:51.730000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5e277e40 a2=40 a3=1 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.730000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.740000 audit: BPF prog-id=184 op=UNLOAD May 10 00:45:51.740000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.740000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff5e277f10 a2=50 a3=7fff5e277ff0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.740000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e277e50 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e277e80 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e277d90 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e277ea0 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e277e80 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e277e70 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e277ea0 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e277e80 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e277ea0 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.771000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.771000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff5e277e70 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.771000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.772000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.772000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5e277ee0 a2=28 a3=0 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.772000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.774000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5e277c90 a2=50 a3=1 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.774000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.774000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.774000 audit: BPF prog-id=185 op=LOAD May 10 00:45:51.774000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff5e277c90 a2=94 a3=5 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.774000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.775000 audit: BPF prog-id=185 op=UNLOAD May 10 00:45:51.775000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff5e277d40 a2=50 a3=1 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.775000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff5e277e60 a2=4 a3=38 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.775000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.775000 audit[4384]: AVC avc: denied { confidentiality } for pid=4384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:51.775000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5e277eb0 a2=94 a3=6 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.775000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.776000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.776000 audit[4384]: AVC avc: denied { confidentiality } for pid=4384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:51.776000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5e277660 a2=94 a3=83 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.776000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.777000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { perfmon } for pid=4384 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { bpf } for pid=4384 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.777000 audit[4384]: AVC avc: denied { confidentiality } for pid=4384 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:51.777000 audit[4384]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff5e277660 a2=94 a3=83 items=0 ppid=4184 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.777000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:45:51.803000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.803000 audit: BPF prog-id=186 op=LOAD May 10 00:45:51.803000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc86abe990 a2=98 a3=1999999999999999 items=0 ppid=4184 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.803000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:51.804000 audit: BPF prog-id=186 op=UNLOAD May 10 00:45:51.804000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit: BPF prog-id=187 op=LOAD May 10 00:45:51.804000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc86abe870 a2=74 a3=ffff items=0 ppid=4184 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.804000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:51.804000 audit: BPF prog-id=187 op=UNLOAD May 10 00:45:51.804000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { perfmon } for pid=4443 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit[4443]: AVC avc: denied { bpf } for pid=4443 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:51.804000 audit: BPF prog-id=188 op=LOAD May 10 00:45:51.804000 audit[4443]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc86abe8b0 a2=40 a3=7ffc86abea90 items=0 ppid=4184 pid=4443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:51.804000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:45:51.804000 audit: BPF prog-id=188 op=UNLOAD May 10 00:45:52.024786 systemd-networkd[1024]: vxlan.calico: Link UP May 10 00:45:52.024798 systemd-networkd[1024]: vxlan.calico: Gained carrier May 10 00:45:52.064900 systemd-networkd[1024]: calica725551d10: Gained IPv6LL May 10 00:45:52.102000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.102000 audit: BPF prog-id=189 op=LOAD May 10 00:45:52.102000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3eb9be80 a2=98 a3=ffffffff items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.102000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.103000 audit: BPF prog-id=189 op=UNLOAD May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit: BPF prog-id=190 op=LOAD May 10 00:45:52.104000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3eb9bc90 a2=74 a3=540051 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.104000 audit: BPF prog-id=190 op=UNLOAD May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit: BPF prog-id=191 op=LOAD May 10 00:45:52.104000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3eb9bcc0 a2=94 a3=2 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.104000 audit: BPF prog-id=191 op=UNLOAD May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3eb9bb90 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.104000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.104000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3eb9bbc0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.104000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3eb9bad0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3eb9bbe0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3eb9bbc0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3eb9bbb0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3eb9bbe0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3eb9bbc0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3eb9bbe0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3eb9bbb0 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3eb9bc20 a2=28 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.105000 audit: BPF prog-id=192 op=LOAD May 10 00:45:52.105000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe3eb9ba90 a2=40 a3=0 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.105000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.106000 audit: BPF prog-id=192 op=UNLOAD May 10 00:45:52.107000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe3eb9ba80 a2=50 a3=2800 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe3eb9ba80 a2=50 a3=2800 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.107000 audit: BPF prog-id=193 op=LOAD May 10 00:45:52.107000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe3eb9b2a0 a2=94 a3=2 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.107000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.108000 audit: BPF prog-id=193 op=UNLOAD May 10 00:45:52.108000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { perfmon } for pid=4468 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit[4468]: AVC avc: denied { bpf } for pid=4468 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.108000 audit: BPF prog-id=194 op=LOAD May 10 00:45:52.108000 audit[4468]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe3eb9b3a0 a2=94 a3=30 items=0 ppid=4184 pid=4468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.108000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.116000 audit: BPF prog-id=195 op=LOAD May 10 00:45:52.116000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffabbaddf0 a2=98 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.116000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.119000 audit: BPF prog-id=195 op=UNLOAD May 10 00:45:52.119000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit: BPF prog-id=196 op=LOAD May 10 00:45:52.119000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffabbadbd0 a2=74 a3=540051 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.119000 audit: BPF prog-id=196 op=UNLOAD May 10 00:45:52.119000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.119000 audit: BPF prog-id=197 op=LOAD May 10 00:45:52.119000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffabbadc00 a2=94 a3=2 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.119000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.119000 audit: BPF prog-id=197 op=UNLOAD May 10 00:45:52.193037 systemd-networkd[1024]: cali22385cd98f2: Gained IPv6LL May 10 00:45:52.487935 kernel: kauditd_printk_skb: 925 callbacks suppressed May 10 00:45:52.488109 kernel: audit: type=1400 audit(1746837952.460:1221): avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.526438 kernel: audit: type=1400 audit(1746837952.460:1221): avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.573311 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:52.573451 kernel: audit: audit_lost=38 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:45:52.573510 kernel: audit: backlog limit exceeded May 10 00:45:52.573548 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:52.573578 kernel: audit: audit_lost=39 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:45:52.573608 kernel: audit: backlog limit exceeded May 10 00:45:52.573640 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:52.573673 kernel: audit: audit_lost=40 audit_rate_limit=0 audit_backlog_limit=64 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.460000 audit: BPF prog-id=198 op=LOAD May 10 00:45:52.460000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffabbadac0 a2=40 a3=1 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.460000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.487000 audit: BPF prog-id=198 op=UNLOAD May 10 00:45:52.487000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.487000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffabbadb90 a2=50 a3=7fffabbadc70 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.487000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffabbadad0 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffabbadb00 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffabbada10 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffabbadb20 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffabbadb00 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffabbadaf0 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffabbadb20 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffabbadb00 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffabbadb20 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffabbadaf0 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffabbadb60 a2=28 a3=0 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffabbad910 a2=50 a3=1 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.527000 audit: BPF prog-id=199 op=LOAD May 10 00:45:52.527000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffabbad910 a2=94 a3=5 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.527000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.579000 audit: BPF prog-id=199 op=UNLOAD May 10 00:45:52.579000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.579000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffabbad9c0 a2=50 a3=1 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.579000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffabbadae0 a2=4 a3=38 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.580000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.580000 audit[4472]: AVC avc: denied { confidentiality } for pid=4472 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:52.580000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffabbadb30 a2=94 a3=6 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.580000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.582000 audit[4472]: AVC avc: denied { confidentiality } for pid=4472 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:52.582000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffabbad2e0 a2=94 a3=83 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.582000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { perfmon } for pid=4472 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.583000 audit[4472]: AVC avc: denied { confidentiality } for pid=4472 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:45:52.583000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffabbad2e0 a2=94 a3=83 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.583000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.585000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.585000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffabbaed20 a2=10 a3=f1f00800 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.585000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.585000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffabbaebc0 a2=10 a3=3 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.585000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.587000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.587000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffabbaeb60 a2=10 a3=3 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.587000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.590000 audit[4472]: AVC avc: denied { bpf } for pid=4472 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:52.590000 audit[4472]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffabbaeb60 a2=10 a3=7 items=0 ppid=4184 pid=4472 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.590000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:45:52.605000 audit: BPF prog-id=194 op=UNLOAD May 10 00:45:52.795000 audit[4507]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=4507 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:52.795000 audit[4507]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff3ad84010 a2=0 a3=7fff3ad83ffc items=0 ppid=4184 pid=4507 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.795000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:52.803000 audit[4506]: NETFILTER_CFG table=raw:102 family=2 entries=21 op=nft_register_chain pid=4506 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:52.803000 audit[4506]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffabaa4b70 a2=0 a3=7fffabaa4b5c items=0 ppid=4184 pid=4506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.803000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:52.849000 audit[4509]: NETFILTER_CFG table=nat:103 family=2 entries=15 op=nft_register_chain pid=4509 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:52.849000 audit[4509]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffcd0357950 a2=0 a3=7ffcd035793c items=0 ppid=4184 pid=4509 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.849000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:52.853000 audit[4512]: NETFILTER_CFG table=filter:104 family=2 entries=241 op=nft_register_chain pid=4512 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:45:52.853000 audit[4512]: SYSCALL arch=c000003e syscall=46 success=yes exit=143200 a0=3 a1=7ffda7cb3690 a2=0 a3=7ffda7cb367c items=0 ppid=4184 pid=4512 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:52.853000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:45:53.102590 env[1215]: time="2025-05-10T00:45:53.102447557Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:53.107037 env[1215]: time="2025-05-10T00:45:53.106981622Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:53.114261 env[1215]: time="2025-05-10T00:45:53.114164220Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:53.116636 env[1215]: time="2025-05-10T00:45:53.116567797Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:53.117771 env[1215]: time="2025-05-10T00:45:53.117715187Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 00:45:53.132398 env[1215]: time="2025-05-10T00:45:53.126675510Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:53.151175 env[1215]: time="2025-05-10T00:45:53.150422243Z" level=info msg="CreateContainer within sandbox \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:45:53.178535 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1194595757.mount: Deactivated successfully. May 10 00:45:53.198486 env[1215]: time="2025-05-10T00:45:53.198389463Z" level=info msg="CreateContainer within sandbox \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\"" May 10 00:45:53.200889 env[1215]: time="2025-05-10T00:45:53.199554722Z" level=info msg="StartContainer for \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\"" May 10 00:45:53.252547 systemd[1]: Started cri-containerd-eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e.scope. May 10 00:45:53.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.292000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit: BPF prog-id=200 op=LOAD May 10 00:45:53.293000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.293000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3611 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.293000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565663039333339376233396463356266386165643237386136343630 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3611 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565663039333339376233396463356266386165643237386136343630 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit: BPF prog-id=201 op=LOAD May 10 00:45:53.294000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd40 items=0 ppid=3611 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565663039333339376233396463356266386165643237386136343630 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit: BPF prog-id=202 op=LOAD May 10 00:45:53.294000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fd88 items=0 ppid=3611 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565663039333339376233396463356266386165643237386136343630 May 10 00:45:53.294000 audit: BPF prog-id=202 op=UNLOAD May 10 00:45:53.294000 audit: BPF prog-id=201 op=UNLOAD May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { perfmon } for pid=4527 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit[4527]: AVC avc: denied { bpf } for pid=4527 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:53.294000 audit: BPF prog-id=203 op=LOAD May 10 00:45:53.294000 audit[4527]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000396198 items=0 ppid=3611 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:53.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6565663039333339376233396463356266386165643237386136343630 May 10 00:45:53.342362 env[1215]: time="2025-05-10T00:45:53.342181684Z" level=info msg="StartContainer for \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\" returns successfully" May 10 00:45:53.921999 systemd-networkd[1024]: vxlan.calico: Gained IPv6LL May 10 00:45:54.236526 kubelet[2110]: I0510 00:45:54.236147 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-c5cc4b9d7-h77nx" podStartSLOduration=28.764310424 podStartE2EDuration="34.236099175s" podCreationTimestamp="2025-05-10 00:45:20 +0000 UTC" firstStartedPulling="2025-05-10 00:45:47.647904512 +0000 UTC m=+49.032978143" lastFinishedPulling="2025-05-10 00:45:53.119693248 +0000 UTC m=+54.504766894" observedRunningTime="2025-05-10 00:45:54.235625201 +0000 UTC m=+55.620698868" watchObservedRunningTime="2025-05-10 00:45:54.236099175 +0000 UTC m=+55.621172832" May 10 00:45:54.264319 systemd[1]: run-containerd-runc-k8s.io-eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e-runc.BIPJX5.mount: Deactivated successfully. May 10 00:45:55.393000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.393000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00d30d680 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:45:55.393000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:55.394000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.394000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00d30d6b0 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:45:55.394000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:55.398000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.398000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ea43f20 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:45:55.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:55.398000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.398000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00ea43f40 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:45:55.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:55.398000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.398000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00d2432f0 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:45:55.398000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:55.430000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.430000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00d30d710 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:45:55.430000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:45:55.672879 env[1215]: time="2025-05-10T00:45:55.669662512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:55.677617 env[1215]: time="2025-05-10T00:45:55.677558744Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:55.680197 env[1215]: time="2025-05-10T00:45:55.680145473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:55.682428 env[1215]: time="2025-05-10T00:45:55.682380187Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:55.683191 env[1215]: time="2025-05-10T00:45:55.683138399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:55.686242 env[1215]: time="2025-05-10T00:45:55.686183437Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 00:45:55.688550 env[1215]: time="2025-05-10T00:45:55.688490188Z" level=info msg="CreateContainer within sandbox \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:55.713916 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount397772147.mount: Deactivated successfully. May 10 00:45:55.719514 env[1215]: time="2025-05-10T00:45:55.719455071Z" level=info msg="CreateContainer within sandbox \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\"" May 10 00:45:55.720527 env[1215]: time="2025-05-10T00:45:55.720485514Z" level=info msg="StartContainer for \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\"" May 10 00:45:55.734000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.734000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027d8a20 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:45:55.734000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:55.734000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:55.734000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001943ee0 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:45:55.734000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:55.767475 systemd[1]: run-containerd-runc-k8s.io-ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153-runc.hxIefP.mount: Deactivated successfully. May 10 00:45:55.778586 systemd[1]: Started cri-containerd-ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153.scope. May 10 00:45:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.805000 audit: BPF prog-id=204 op=LOAD May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3916 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363438343866353065663766393532363036323865353437393466 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3916 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363438343866353065663766393532363036323865353437393466 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit: BPF prog-id=205 op=LOAD May 10 00:45:55.806000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028d490 items=0 ppid=3916 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363438343866353065663766393532363036323865353437393466 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit: BPF prog-id=206 op=LOAD May 10 00:45:55.806000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028d4d8 items=0 ppid=3916 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363438343866353065663766393532363036323865353437393466 May 10 00:45:55.806000 audit: BPF prog-id=206 op=UNLOAD May 10 00:45:55.806000 audit: BPF prog-id=205 op=UNLOAD May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { perfmon } for pid=4581 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit[4581]: AVC avc: denied { bpf } for pid=4581 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:55.806000 audit: BPF prog-id=207 op=LOAD May 10 00:45:55.806000 audit[4581]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028d8e8 items=0 ppid=3916 pid=4581 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:55.806000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163363438343866353065663766393532363036323865353437393466 May 10 00:45:55.863499 env[1215]: time="2025-05-10T00:45:55.863434570Z" level=info msg="StartContainer for \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\" returns successfully" May 10 00:45:56.244198 kubelet[2110]: I0510 00:45:56.244095 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8656cd8877-b6k55" podStartSLOduration=29.896818384 podStartE2EDuration="36.244065957s" podCreationTimestamp="2025-05-10 00:45:20 +0000 UTC" firstStartedPulling="2025-05-10 00:45:49.337398378 +0000 UTC m=+50.722472027" lastFinishedPulling="2025-05-10 00:45:55.684645945 +0000 UTC m=+57.069719600" observedRunningTime="2025-05-10 00:45:56.242330986 +0000 UTC m=+57.627404644" watchObservedRunningTime="2025-05-10 00:45:56.244065957 +0000 UTC m=+57.629139615" May 10 00:45:56.268000 audit[4613]: NETFILTER_CFG table=filter:105 family=2 entries=10 op=nft_register_rule pid=4613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:56.268000 audit[4613]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff240ea210 a2=0 a3=7fff240ea1fc items=0 ppid=2301 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:56.268000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:56.273000 audit[4613]: NETFILTER_CFG table=nat:106 family=2 entries=20 op=nft_register_rule pid=4613 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:56.273000 audit[4613]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff240ea210 a2=0 a3=7fff240ea1fc items=0 ppid=2301 pid=4613 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:56.273000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:57.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.17:22-147.75.109.163:49444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:57.178290 systemd[1]: Started sshd@8-10.128.0.17:22-147.75.109.163:49444.service. May 10 00:45:57.226864 kubelet[2110]: I0510 00:45:57.225660 2110 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:57.259090 env[1215]: time="2025-05-10T00:45:57.259025703Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.264773 env[1215]: time="2025-05-10T00:45:57.264707518Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.268567 env[1215]: time="2025-05-10T00:45:57.268481399Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.271739 env[1215]: time="2025-05-10T00:45:57.271688287Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.274582 env[1215]: time="2025-05-10T00:45:57.273399473Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 00:45:57.281578 env[1215]: time="2025-05-10T00:45:57.281523264Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:57.284650 env[1215]: time="2025-05-10T00:45:57.284606598Z" level=info msg="CreateContainer within sandbox \"772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 00:45:57.317871 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1635539540.mount: Deactivated successfully. May 10 00:45:57.324823 env[1215]: time="2025-05-10T00:45:57.324759482Z" level=info msg="CreateContainer within sandbox \"772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"a7b1e002378b9e822f1aeacee554bd4d81d60e11d9e56d59602bd21eb5b6f7a3\"" May 10 00:45:57.332365 env[1215]: time="2025-05-10T00:45:57.332315056Z" level=info msg="StartContainer for \"a7b1e002378b9e822f1aeacee554bd4d81d60e11d9e56d59602bd21eb5b6f7a3\"" May 10 00:45:57.373755 systemd[1]: Started cri-containerd-a7b1e002378b9e822f1aeacee554bd4d81d60e11d9e56d59602bd21eb5b6f7a3.scope. May 10 00:45:57.401320 systemd[1]: run-containerd-runc-k8s.io-a7b1e002378b9e822f1aeacee554bd4d81d60e11d9e56d59602bd21eb5b6f7a3-runc.EjqohT.mount: Deactivated successfully. May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f55468d6b38 items=0 ppid=3612 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623165303032333738623965383232663161656163656535353462 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit: BPF prog-id=208 op=LOAD May 10 00:45:57.453000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003da018 items=0 ppid=3612 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623165303032333738623965383232663161656163656535353462 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit: BPF prog-id=209 op=LOAD May 10 00:45:57.453000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003da068 items=0 ppid=3612 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623165303032333738623965383232663161656163656535353462 May 10 00:45:57.453000 audit: BPF prog-id=209 op=UNLOAD May 10 00:45:57.453000 audit: BPF prog-id=208 op=UNLOAD May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { perfmon } for pid=4628 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit[4628]: AVC avc: denied { bpf } for pid=4628 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.453000 audit: BPF prog-id=210 op=LOAD May 10 00:45:57.453000 audit[4628]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003da0f8 items=0 ppid=3612 pid=4628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6137623165303032333738623965383232663161656163656535353462 May 10 00:45:57.489456 env[1215]: time="2025-05-10T00:45:57.489374698Z" level=info msg="StartContainer for \"a7b1e002378b9e822f1aeacee554bd4d81d60e11d9e56d59602bd21eb5b6f7a3\" returns successfully" May 10 00:45:57.494248 env[1215]: time="2025-05-10T00:45:57.494188095Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.497147 env[1215]: time="2025-05-10T00:45:57.497099395Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.499607 env[1215]: time="2025-05-10T00:45:57.499555275Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.502256 env[1215]: time="2025-05-10T00:45:57.502192249Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.503049 env[1215]: time="2025-05-10T00:45:57.503007583Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:57.505736 env[1215]: time="2025-05-10T00:45:57.505698165Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 00:45:57.507614 env[1215]: time="2025-05-10T00:45:57.507571623Z" level=info msg="CreateContainer within sandbox \"13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:57.558377 kernel: kauditd_printk_skb: 325 callbacks suppressed May 10 00:45:57.558527 kernel: audit: type=1101 audit(1746837957.525:1305): pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:57.525000 audit[4618]: USER_ACCT pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:57.562208 sshd[4618]: Accepted publickey for core from 147.75.109.163 port 49444 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:45:57.561697 sshd[4618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:45:57.596404 kernel: audit: type=1103 audit(1746837957.557:1306): pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:57.557000 audit[4618]: CRED_ACQ pid=4618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:57.616625 kernel: audit: type=1006 audit(1746837957.557:1307): pid=4618 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 10 00:45:57.597897 systemd-logind[1227]: New session 8 of user core. May 10 00:45:57.603977 systemd[1]: Started session-8.scope. May 10 00:45:57.557000 audit[4618]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe304cf8b0 a2=3 a3=0 items=0 ppid=1 pid=4618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.626891 env[1215]: time="2025-05-10T00:45:57.626822673Z" level=info msg="CreateContainer within sandbox \"13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"42062d7572406c4823a79be2735791079bc1005b5d455f9d31ace12b202fccfa\"" May 10 00:45:57.631374 env[1215]: time="2025-05-10T00:45:57.631323071Z" level=info msg="StartContainer for \"42062d7572406c4823a79be2735791079bc1005b5d455f9d31ace12b202fccfa\"" May 10 00:45:57.664002 kernel: audit: type=1300 audit(1746837957.557:1307): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe304cf8b0 a2=3 a3=0 items=0 ppid=1 pid=4618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.664158 kernel: audit: type=1327 audit(1746837957.557:1307): proctitle=737368643A20636F7265205B707269765D May 10 00:45:57.557000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:45:57.615000 audit[4618]: USER_START pid=4618 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:57.695871 systemd[1]: Started cri-containerd-42062d7572406c4823a79be2735791079bc1005b5d455f9d31ace12b202fccfa.scope. May 10 00:45:57.699254 kernel: audit: type=1105 audit(1746837957.615:1308): pid=4618 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:57.619000 audit[4656]: CRED_ACQ pid=4656 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:57.730195 kernel: audit: type=1103 audit(1746837957.619:1309): pid=4656 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:57.781986 env[1215]: time="2025-05-10T00:45:57.781927998Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.786711 env[1215]: time="2025-05-10T00:45:57.786658082Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.791106 env[1215]: time="2025-05-10T00:45:57.791051210Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.797662 env[1215]: time="2025-05-10T00:45:57.797610006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 00:45:57.798986 env[1215]: time="2025-05-10T00:45:57.798930067Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 00:45:57.807856 env[1215]: time="2025-05-10T00:45:57.807798270Z" level=info msg="CreateContainer within sandbox \"9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 00:45:57.832267 env[1215]: time="2025-05-10T00:45:57.832177898Z" level=info msg="CreateContainer within sandbox \"9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"fed8ec507e2c54bbe99c2cbbf4f6ab5927e5ca20770cfcf4937633a7571b65b2\"" May 10 00:45:57.833794 env[1215]: time="2025-05-10T00:45:57.833746335Z" level=info msg="StartContainer for \"fed8ec507e2c54bbe99c2cbbf4f6ab5927e5ca20770cfcf4937633a7571b65b2\"" May 10 00:45:57.880588 systemd[1]: Started cri-containerd-fed8ec507e2c54bbe99c2cbbf4f6ab5927e5ca20770cfcf4937633a7571b65b2.scope. May 10 00:45:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.916258 kernel: audit: type=1400 audit(1746837957.894:1310): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.929708 kubelet[2110]: I0510 00:45:57.929633 2110 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 00:45:57.929708 kubelet[2110]: I0510 00:45:57.929710 2110 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 00:45:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.972253 kernel: audit: type=1400 audit(1746837957.894:1311): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.982258 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 00:45:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.921000 audit: BPF prog-id=211 op=LOAD May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4322 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432303632643735373234303663343832336137396265323733353739 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4322 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432303632643735373234303663343832336137396265323733353739 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit: BPF prog-id=212 op=LOAD May 10 00:45:57.922000 audit[4663]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000220370 items=0 ppid=4322 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432303632643735373234303663343832336137396265323733353739 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit: BPF prog-id=213 op=LOAD May 10 00:45:57.922000 audit[4663]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002203b8 items=0 ppid=4322 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432303632643735373234303663343832336137396265323733353739 May 10 00:45:57.922000 audit: BPF prog-id=213 op=UNLOAD May 10 00:45:57.922000 audit: BPF prog-id=212 op=UNLOAD May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { perfmon } for pid=4663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit[4663]: AVC avc: denied { bpf } for pid=4663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.922000 audit: BPF prog-id=214 op=LOAD May 10 00:45:57.922000 audit[4663]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002207c8 items=0 ppid=4322 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3432303632643735373234303663343832336137396265323733353739 May 10 00:45:57.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.983000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.983000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e2608 items=0 ppid=4366 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643865633530376532633534626265393963326362626634663661 May 10 00:45:57.984000 audit: BPF prog-id=217 op=UNLOAD May 10 00:45:57.984000 audit: BPF prog-id=216 op=UNLOAD May 10 00:45:57.984000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { perfmon } for pid=4694 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit[4694]: AVC avc: denied { bpf } for pid=4694 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:45:57.984000 audit: BPF prog-id=218 op=LOAD May 10 00:45:57.984000 audit[4694]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e2a18 items=0 ppid=4366 pid=4694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:57.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643865633530376532633534626265393963326362626634663661 May 10 00:45:58.039537 sshd[4618]: pam_unix(sshd:session): session closed for user core May 10 00:45:58.043000 audit[4618]: USER_END pid=4618 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:58.043000 audit[4618]: CRED_DISP pid=4618 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:45:58.046542 systemd[1]: sshd@8-10.128.0.17:22-147.75.109.163:49444.service: Deactivated successfully. May 10 00:45:58.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.128.0.17:22-147.75.109.163:49444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:45:58.047919 systemd[1]: session-8.scope: Deactivated successfully. May 10 00:45:58.050428 systemd-logind[1227]: Session 8 logged out. Waiting for processes to exit. May 10 00:45:58.052184 systemd-logind[1227]: Removed session 8. May 10 00:45:58.091605 env[1215]: time="2025-05-10T00:45:58.091532285Z" level=info msg="StartContainer for \"42062d7572406c4823a79be2735791079bc1005b5d455f9d31ace12b202fccfa\" returns successfully" May 10 00:45:58.174493 env[1215]: time="2025-05-10T00:45:58.174403594Z" level=info msg="StartContainer for \"fed8ec507e2c54bbe99c2cbbf4f6ab5927e5ca20770cfcf4937633a7571b65b2\" returns successfully" May 10 00:45:58.261988 kubelet[2110]: I0510 00:45:58.261903 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-8656cd8877-tqhzm" podStartSLOduration=31.869496692 podStartE2EDuration="38.261875854s" podCreationTimestamp="2025-05-10 00:45:20 +0000 UTC" firstStartedPulling="2025-05-10 00:45:51.41099805 +0000 UTC m=+52.796071680" lastFinishedPulling="2025-05-10 00:45:57.80337719 +0000 UTC m=+59.188450842" observedRunningTime="2025-05-10 00:45:58.260943673 +0000 UTC m=+59.646017341" watchObservedRunningTime="2025-05-10 00:45:58.261875854 +0000 UTC m=+59.646949513" May 10 00:45:58.295955 kubelet[2110]: I0510 00:45:58.295789 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7988f79fb9-8gxhl" podStartSLOduration=31.112791638 podStartE2EDuration="37.295758644s" podCreationTimestamp="2025-05-10 00:45:21 +0000 UTC" firstStartedPulling="2025-05-10 00:45:51.321585475 +0000 UTC m=+52.706659122" lastFinishedPulling="2025-05-10 00:45:57.504552459 +0000 UTC m=+58.889626128" observedRunningTime="2025-05-10 00:45:58.294943731 +0000 UTC m=+59.680017390" watchObservedRunningTime="2025-05-10 00:45:58.295758644 +0000 UTC m=+59.680832291" May 10 00:45:58.333476 kubelet[2110]: I0510 00:45:58.333377 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-nv9sq" podStartSLOduration=28.66543499 podStartE2EDuration="38.333349573s" podCreationTimestamp="2025-05-10 00:45:20 +0000 UTC" firstStartedPulling="2025-05-10 00:45:47.609916082 +0000 UTC m=+48.994989723" lastFinishedPulling="2025-05-10 00:45:57.277830653 +0000 UTC m=+58.662904306" observedRunningTime="2025-05-10 00:45:58.328094192 +0000 UTC m=+59.713167864" watchObservedRunningTime="2025-05-10 00:45:58.333349573 +0000 UTC m=+59.718423230" May 10 00:45:58.372000 audit[4742]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=4742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:58.372000 audit[4742]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd64dcb5f0 a2=0 a3=7ffd64dcb5dc items=0 ppid=2301 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:58.372000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:58.381000 audit[4742]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=4742 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:58.381000 audit[4742]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd64dcb5f0 a2=0 a3=7ffd64dcb5dc items=0 ppid=2301 pid=4742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:58.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:58.403000 audit[4745]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:58.403000 audit[4745]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd3061fb30 a2=0 a3=7ffd3061fb1c items=0 ppid=2301 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:58.403000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:58.409000 audit[4745]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4745 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:45:58.409000 audit[4745]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd3061fb30 a2=0 a3=7ffd3061fb1c items=0 ppid=2301 pid=4745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:45:58.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:45:58.779250 env[1215]: time="2025-05-10T00:45:58.779187390Z" level=info msg="StopPodSandbox for \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\"" May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.863 [WARNING][4762] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0", GenerateName:"calico-kube-controllers-c5cc4b9d7-", Namespace:"calico-system", SelfLink:"", UID:"717a7e75-4b38-438f-a17d-8863eee7015a", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c5cc4b9d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622", Pod:"calico-kube-controllers-c5cc4b9d7-h77nx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic784db14222", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.864 [INFO][4762] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.864 [INFO][4762] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" iface="eth0" netns="" May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.864 [INFO][4762] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.864 [INFO][4762] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.950 [INFO][4771] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.950 [INFO][4771] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.950 [INFO][4771] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.964 [WARNING][4771] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.964 [INFO][4771] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.968 [INFO][4771] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:58.971920 env[1215]: 2025-05-10 00:45:58.970 [INFO][4762] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:58.972750 env[1215]: time="2025-05-10T00:45:58.971966294Z" level=info msg="TearDown network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\" successfully" May 10 00:45:58.972750 env[1215]: time="2025-05-10T00:45:58.972008190Z" level=info msg="StopPodSandbox for \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\" returns successfully" May 10 00:45:58.973328 env[1215]: time="2025-05-10T00:45:58.973264760Z" level=info msg="RemovePodSandbox for \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\"" May 10 00:45:58.973607 env[1215]: time="2025-05-10T00:45:58.973522905Z" level=info msg="Forcibly stopping sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\"" May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.064 [WARNING][4790] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0", GenerateName:"calico-kube-controllers-c5cc4b9d7-", Namespace:"calico-system", SelfLink:"", UID:"717a7e75-4b38-438f-a17d-8863eee7015a", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c5cc4b9d7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622", Pod:"calico-kube-controllers-c5cc4b9d7-h77nx", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic784db14222", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.065 [INFO][4790] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.065 [INFO][4790] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" iface="eth0" netns="" May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.065 [INFO][4790] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.065 [INFO][4790] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.136 [INFO][4797] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.137 [INFO][4797] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.137 [INFO][4797] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.152 [WARNING][4797] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.152 [INFO][4797] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" HandleID="k8s-pod-network.2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.155 [INFO][4797] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:59.159525 env[1215]: 2025-05-10 00:45:59.157 [INFO][4790] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7" May 10 00:45:59.161610 env[1215]: time="2025-05-10T00:45:59.159473297Z" level=info msg="TearDown network for sandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\" successfully" May 10 00:45:59.171964 env[1215]: time="2025-05-10T00:45:59.171846106Z" level=info msg="RemovePodSandbox \"2688d56ba4efe998d9fa06b2d7c445d56bc9b67d0eea689d5fe92f58c87449f7\" returns successfully" May 10 00:45:59.172743 env[1215]: time="2025-05-10T00:45:59.172693018Z" level=info msg="StopPodSandbox for \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\"" May 10 00:45:59.254267 kubelet[2110]: I0510 00:45:59.253115 2110 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:45:59.256000 audit[4592]: AVC avc: denied { watch } for pid=4592 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_33.626758716/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c582,c793 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c582,c793 tclass=file permissive=0 May 10 00:45:59.256000 audit[4592]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0006d6460 a2=fc6 a3=0 items=0 ppid=3916 pid=4592 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c582,c793 key=(null) May 10 00:45:59.256000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.275 [WARNING][4817] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0", GenerateName:"calico-apiserver-7988f79fb9-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f8081a2-a538-42ca-bc08-56e312bd1da7", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7988f79fb9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594", Pod:"calico-apiserver-7988f79fb9-8gxhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali22385cd98f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.276 [INFO][4817] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.276 [INFO][4817] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" iface="eth0" netns="" May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.276 [INFO][4817] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.276 [INFO][4817] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.332 [INFO][4824] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.333 [INFO][4824] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.333 [INFO][4824] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.345 [WARNING][4824] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.345 [INFO][4824] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.348 [INFO][4824] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:59.352628 env[1215]: 2025-05-10 00:45:59.350 [INFO][4817] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:59.353845 env[1215]: time="2025-05-10T00:45:59.352674682Z" level=info msg="TearDown network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\" successfully" May 10 00:45:59.353845 env[1215]: time="2025-05-10T00:45:59.352714294Z" level=info msg="StopPodSandbox for \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\" returns successfully" May 10 00:45:59.353845 env[1215]: time="2025-05-10T00:45:59.353472204Z" level=info msg="RemovePodSandbox for \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\"" May 10 00:45:59.353845 env[1215]: time="2025-05-10T00:45:59.353518515Z" level=info msg="Forcibly stopping sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\"" May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.429 [WARNING][4843] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0", GenerateName:"calico-apiserver-7988f79fb9-", Namespace:"calico-apiserver", SelfLink:"", UID:"2f8081a2-a538-42ca-bc08-56e312bd1da7", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7988f79fb9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"13308a4ce423fded3d1eb39a774772d2f2d9f9cb9d955636e61bb1cddd658594", Pod:"calico-apiserver-7988f79fb9-8gxhl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali22385cd98f2", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.430 [INFO][4843] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.430 [INFO][4843] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" iface="eth0" netns="" May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.430 [INFO][4843] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.430 [INFO][4843] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.522 [INFO][4850] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.523 [INFO][4850] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.523 [INFO][4850] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.546 [WARNING][4850] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.549 [INFO][4850] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" HandleID="k8s-pod-network.69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--7988f79fb9--8gxhl-eth0" May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.552 [INFO][4850] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:59.556885 env[1215]: 2025-05-10 00:45:59.553 [INFO][4843] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11" May 10 00:45:59.557826 env[1215]: time="2025-05-10T00:45:59.556933322Z" level=info msg="TearDown network for sandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\" successfully" May 10 00:45:59.566496 env[1215]: time="2025-05-10T00:45:59.566394050Z" level=info msg="RemovePodSandbox \"69f25b4048963a1e499a1de32866822b1d11f31c7dd5ac97bb39a1255793fe11\" returns successfully" May 10 00:45:59.567240 env[1215]: time="2025-05-10T00:45:59.567181440Z" level=info msg="StopPodSandbox for \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\"" May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.655 [WARNING][4869] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8c4cdfb5-cee1-4888-853f-5335203970a8", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db", Pod:"coredns-7db6d8ff4d-6zhnn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b4f49f9d70", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.656 [INFO][4869] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.656 [INFO][4869] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" iface="eth0" netns="" May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.656 [INFO][4869] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.656 [INFO][4869] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.706 [INFO][4876] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.712 [INFO][4876] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.712 [INFO][4876] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.728 [WARNING][4876] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.728 [INFO][4876] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.730 [INFO][4876] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:59.734482 env[1215]: 2025-05-10 00:45:59.732 [INFO][4869] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:59.735425 env[1215]: time="2025-05-10T00:45:59.734530016Z" level=info msg="TearDown network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\" successfully" May 10 00:45:59.735425 env[1215]: time="2025-05-10T00:45:59.734574354Z" level=info msg="StopPodSandbox for \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\" returns successfully" May 10 00:45:59.735425 env[1215]: time="2025-05-10T00:45:59.735150533Z" level=info msg="RemovePodSandbox for \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\"" May 10 00:45:59.735425 env[1215]: time="2025-05-10T00:45:59.735195598Z" level=info msg="Forcibly stopping sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\"" May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.826 [WARNING][4897] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8c4cdfb5-cee1-4888-853f-5335203970a8", ResourceVersion:"840", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"129aeac53ab645e72d179435f0d4256b77fbdeb940db3b986e378f35ed04b7db", Pod:"coredns-7db6d8ff4d-6zhnn", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali6b4f49f9d70", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.826 [INFO][4897] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.826 [INFO][4897] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" iface="eth0" netns="" May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.826 [INFO][4897] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.827 [INFO][4897] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.877 [INFO][4905] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.878 [INFO][4905] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.878 [INFO][4905] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.888 [WARNING][4905] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.888 [INFO][4905] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" HandleID="k8s-pod-network.452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--6zhnn-eth0" May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.891 [INFO][4905] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:45:59.895021 env[1215]: 2025-05-10 00:45:59.893 [INFO][4897] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3" May 10 00:45:59.895021 env[1215]: time="2025-05-10T00:45:59.894961182Z" level=info msg="TearDown network for sandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\" successfully" May 10 00:45:59.903277 env[1215]: time="2025-05-10T00:45:59.903201914Z" level=info msg="RemovePodSandbox \"452185b5d3b8a88d9b6aa554e1bf9836b6a7ad4b172818e9fd42646be9ccb5f3\" returns successfully" May 10 00:45:59.904338 env[1215]: time="2025-05-10T00:45:59.904293320Z" level=info msg="StopPodSandbox for \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\"" May 10 00:45:59.934000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:59.934000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c38620 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:45:59.934000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:59.935000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:59.935000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c38640 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:45:59.935000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:59.936000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:59.936000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c38900 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:45:59.936000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:45:59.938000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:45:59.938000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0019c8440 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:45:59.938000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:00.042232 env[1215]: 2025-05-10 00:45:59.973 [WARNING][4924] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8760e388-ade0-4878-aa30-3b32b709df01", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7", Pod:"coredns-7db6d8ff4d-p768n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali01af897f6b9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:00.042232 env[1215]: 2025-05-10 00:45:59.973 [INFO][4924] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:46:00.042232 env[1215]: 2025-05-10 00:45:59.973 [INFO][4924] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" iface="eth0" netns="" May 10 00:46:00.042232 env[1215]: 2025-05-10 00:45:59.973 [INFO][4924] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:46:00.042232 env[1215]: 2025-05-10 00:45:59.973 [INFO][4924] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:46:00.042232 env[1215]: 2025-05-10 00:46:00.021 [INFO][4931] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:46:00.042232 env[1215]: 2025-05-10 00:46:00.021 [INFO][4931] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:00.042232 env[1215]: 2025-05-10 00:46:00.021 [INFO][4931] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:00.042232 env[1215]: 2025-05-10 00:46:00.036 [WARNING][4931] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:46:00.042232 env[1215]: 2025-05-10 00:46:00.036 [INFO][4931] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:46:00.042232 env[1215]: 2025-05-10 00:46:00.039 [INFO][4931] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:00.042232 env[1215]: 2025-05-10 00:46:00.040 [INFO][4924] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:46:00.043484 env[1215]: time="2025-05-10T00:46:00.043424007Z" level=info msg="TearDown network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\" successfully" May 10 00:46:00.043690 env[1215]: time="2025-05-10T00:46:00.043654819Z" level=info msg="StopPodSandbox for \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\" returns successfully" May 10 00:46:00.044689 env[1215]: time="2025-05-10T00:46:00.044647477Z" level=info msg="RemovePodSandbox for \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\"" May 10 00:46:00.044973 env[1215]: time="2025-05-10T00:46:00.044890559Z" level=info msg="Forcibly stopping sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\"" May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.159 [WARNING][4951] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"8760e388-ade0-4878-aa30-3b32b709df01", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"dfb031e5ccdc85e07e47cc502b7f38237b2442a7b79bb60a16710e29087305b7", Pod:"coredns-7db6d8ff4d-p768n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.5.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali01af897f6b9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.159 [INFO][4951] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.159 [INFO][4951] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" iface="eth0" netns="" May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.159 [INFO][4951] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.159 [INFO][4951] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.207 [INFO][4958] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.209 [INFO][4958] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.209 [INFO][4958] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.228 [WARNING][4958] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.228 [INFO][4958] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" HandleID="k8s-pod-network.bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-coredns--7db6d8ff4d--p768n-eth0" May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.230 [INFO][4958] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:00.234996 env[1215]: 2025-05-10 00:46:00.232 [INFO][4951] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d" May 10 00:46:00.235958 env[1215]: time="2025-05-10T00:46:00.235040044Z" level=info msg="TearDown network for sandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\" successfully" May 10 00:46:00.242861 env[1215]: time="2025-05-10T00:46:00.242758343Z" level=info msg="RemovePodSandbox \"bed0d67dfd28fcd53afda6665b7d77f8bdcfe8c81ad0b5c96ecb529aebe4473d\" returns successfully" May 10 00:46:00.243593 env[1215]: time="2025-05-10T00:46:00.243539725Z" level=info msg="StopPodSandbox for \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\"" May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.330 [WARNING][4976] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59ed8057-dfcb-47c2-9e56-afc23d0a505f", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b", Pod:"csi-node-driver-nv9sq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7c942440a10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.331 [INFO][4976] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.331 [INFO][4976] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" iface="eth0" netns="" May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.331 [INFO][4976] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.331 [INFO][4976] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.375 [INFO][4983] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.375 [INFO][4983] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.375 [INFO][4983] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.401 [WARNING][4983] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.401 [INFO][4983] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.406 [INFO][4983] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:00.411115 env[1215]: 2025-05-10 00:46:00.409 [INFO][4976] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:46:00.412270 env[1215]: time="2025-05-10T00:46:00.412192543Z" level=info msg="TearDown network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\" successfully" May 10 00:46:00.412465 env[1215]: time="2025-05-10T00:46:00.412426124Z" level=info msg="StopPodSandbox for \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\" returns successfully" May 10 00:46:00.413347 env[1215]: time="2025-05-10T00:46:00.413298771Z" level=info msg="RemovePodSandbox for \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\"" May 10 00:46:00.413608 env[1215]: time="2025-05-10T00:46:00.413532735Z" level=info msg="Forcibly stopping sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\"" May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.503 [WARNING][5003] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"59ed8057-dfcb-47c2-9e56-afc23d0a505f", ResourceVersion:"936", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"772cf1401f0fd2c3879c1ca159c78d09c8be06f85e5461086a8bc0cd0aa2910b", Pod:"csi-node-driver-nv9sq", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.5.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali7c942440a10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.504 [INFO][5003] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.504 [INFO][5003] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" iface="eth0" netns="" May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.504 [INFO][5003] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.504 [INFO][5003] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.537 [INFO][5010] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.538 [INFO][5010] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.538 [INFO][5010] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.545 [WARNING][5010] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.545 [INFO][5010] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" HandleID="k8s-pod-network.323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-csi--node--driver--nv9sq-eth0" May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.547 [INFO][5010] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:00.551976 env[1215]: 2025-05-10 00:46:00.548 [INFO][5003] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37" May 10 00:46:00.551976 env[1215]: time="2025-05-10T00:46:00.550549859Z" level=info msg="TearDown network for sandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\" successfully" May 10 00:46:00.557324 env[1215]: time="2025-05-10T00:46:00.557259478Z" level=info msg="RemovePodSandbox \"323f136141c554944dbef4ad41ab3414c70a445d7a82f6d201e62ea6d0596b37\" returns successfully" May 10 00:46:00.558164 env[1215]: time="2025-05-10T00:46:00.558040767Z" level=info msg="StopPodSandbox for \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\"" May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.650 [WARNING][5031] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0", GenerateName:"calico-apiserver-8656cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"58f0c618-8c39-4fc5-9de2-84bc9752ee7c", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8656cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4", Pod:"calico-apiserver-8656cd8877-tqhzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calica725551d10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.651 [INFO][5031] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.651 [INFO][5031] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" iface="eth0" netns="" May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.651 [INFO][5031] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.651 [INFO][5031] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.700 [INFO][5039] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.701 [INFO][5039] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.701 [INFO][5039] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.724 [WARNING][5039] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.724 [INFO][5039] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.728 [INFO][5039] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:00.731869 env[1215]: 2025-05-10 00:46:00.729 [INFO][5031] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:46:00.733052 env[1215]: time="2025-05-10T00:46:00.732998124Z" level=info msg="TearDown network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\" successfully" May 10 00:46:00.733204 env[1215]: time="2025-05-10T00:46:00.733177759Z" level=info msg="StopPodSandbox for \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\" returns successfully" May 10 00:46:00.734648 env[1215]: time="2025-05-10T00:46:00.734608633Z" level=info msg="RemovePodSandbox for \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\"" May 10 00:46:00.734919 env[1215]: time="2025-05-10T00:46:00.734844513Z" level=info msg="Forcibly stopping sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\"" May 10 00:46:00.782000 audit[4673]: AVC avc: denied { watch } for pid=4673 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_33.3513965873/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c508 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c422,c508 tclass=file permissive=0 May 10 00:46:00.782000 audit[4673]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000143e00 a2=fc6 a3=0 items=0 ppid=4322 pid=4673 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c508 key=(null) May 10 00:46:00.782000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:00.860000 audit[4707]: AVC avc: denied { watch } for pid=4707 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_33.472549325/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c987 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c987 tclass=file permissive=0 May 10 00:46:00.860000 audit[4707]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0009bb680 a2=fc6 a3=0 items=0 ppid=4366 pid=4707 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c987 key=(null) May 10 00:46:00.860000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.830 [WARNING][5058] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0", GenerateName:"calico-apiserver-8656cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"58f0c618-8c39-4fc5-9de2-84bc9752ee7c", ResourceVersion:"931", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8656cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"9a8aa0110f7a2daf91fc8513338b0cf3d37b6fc7fb9e10db238260f4eebf1ca4", Pod:"calico-apiserver-8656cd8877-tqhzm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.71/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calica725551d10", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.830 [INFO][5058] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.831 [INFO][5058] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" iface="eth0" netns="" May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.831 [INFO][5058] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.831 [INFO][5058] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.880 [INFO][5066] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.881 [INFO][5066] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.881 [INFO][5066] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.892 [WARNING][5066] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.892 [INFO][5066] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" HandleID="k8s-pod-network.40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--tqhzm-eth0" May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.894 [INFO][5066] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:00.899302 env[1215]: 2025-05-10 00:46:00.896 [INFO][5058] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6" May 10 00:46:00.899302 env[1215]: time="2025-05-10T00:46:00.898132108Z" level=info msg="TearDown network for sandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\" successfully" May 10 00:46:00.904427 env[1215]: time="2025-05-10T00:46:00.904373456Z" level=info msg="RemovePodSandbox \"40b6a87acfe5f989da156c52dfacd91224495cb31053275797de0ddb53f417a6\" returns successfully" May 10 00:46:00.905888 env[1215]: time="2025-05-10T00:46:00.905844891Z" level=info msg="StopPodSandbox for \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\"" May 10 00:46:00.966000 audit[5092]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:00.966000 audit[5092]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffe0c4cd80 a2=0 a3=7fffe0c4cd6c items=0 ppid=2301 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:00.971000 audit[5092]: NETFILTER_CFG table=nat:112 family=2 entries=27 op=nft_register_chain pid=5092 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:00.971000 audit[5092]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7fffe0c4cd80 a2=0 a3=7fffe0c4cd6c items=0 ppid=2301 pid=5092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:00.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.017 [WARNING][5086] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0", GenerateName:"calico-apiserver-8656cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"e9284258-7d98-4c92-a4ab-848849f17105", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8656cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6", Pod:"calico-apiserver-8656cd8877-b6k55", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali495b0cd11bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.018 [INFO][5086] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.018 [INFO][5086] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" iface="eth0" netns="" May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.018 [INFO][5086] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.018 [INFO][5086] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.068 [INFO][5095] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.068 [INFO][5095] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.068 [INFO][5095] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.081 [WARNING][5095] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.081 [INFO][5095] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.083 [INFO][5095] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:01.090469 env[1215]: 2025-05-10 00:46:01.088 [INFO][5086] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:46:01.091581 env[1215]: time="2025-05-10T00:46:01.091513163Z" level=info msg="TearDown network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\" successfully" May 10 00:46:01.091581 env[1215]: time="2025-05-10T00:46:01.091577694Z" level=info msg="StopPodSandbox for \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\" returns successfully" May 10 00:46:01.092786 env[1215]: time="2025-05-10T00:46:01.092730903Z" level=info msg="RemovePodSandbox for \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\"" May 10 00:46:01.093049 env[1215]: time="2025-05-10T00:46:01.092975963Z" level=info msg="Forcibly stopping sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\"" May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.157 [WARNING][5114] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0", GenerateName:"calico-apiserver-8656cd8877-", Namespace:"calico-apiserver", SelfLink:"", UID:"e9284258-7d98-4c92-a4ab-848849f17105", ResourceVersion:"876", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 45, 20, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"8656cd8877", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6", Pod:"calico-apiserver-8656cd8877-b6k55", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.5.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali495b0cd11bb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.157 [INFO][5114] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.157 [INFO][5114] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" iface="eth0" netns="" May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.157 [INFO][5114] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.157 [INFO][5114] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.188 [INFO][5121] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.190 [INFO][5121] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.190 [INFO][5121] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.197 [WARNING][5121] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.197 [INFO][5121] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" HandleID="k8s-pod-network.9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.202 [INFO][5121] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:01.205109 env[1215]: 2025-05-10 00:46:01.203 [INFO][5114] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98" May 10 00:46:01.205109 env[1215]: time="2025-05-10T00:46:01.204957276Z" level=info msg="TearDown network for sandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\" successfully" May 10 00:46:01.211256 env[1215]: time="2025-05-10T00:46:01.211147301Z" level=info msg="RemovePodSandbox \"9f928dc702a2423158b47abc317ceb61e8d3da0645aa783b46c7fbce51815f98\" returns successfully" May 10 00:46:03.089294 systemd[1]: Started sshd@9-10.128.0.17:22-147.75.109.163:49456.service. May 10 00:46:03.121388 kernel: kauditd_printk_skb: 201 callbacks suppressed May 10 00:46:03.121627 kernel: audit: type=1130 audit(1746837963.089:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.17:22-147.75.109.163:49456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.17:22-147.75.109.163:49456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.430745 kernel: audit: type=1101 audit(1746837963.397:1355): pid=5138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.397000 audit[5138]: USER_ACCT pid=5138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.430104 sshd[5138]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:03.434603 sshd[5138]: Accepted publickey for core from 147.75.109.163 port 49456 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:03.439431 systemd[1]: Started session-9.scope. May 10 00:46:03.428000 audit[5138]: CRED_ACQ pid=5138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.440813 systemd-logind[1227]: New session 9 of user core. May 10 00:46:03.482520 kernel: audit: type=1103 audit(1746837963.428:1356): pid=5138 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.482669 kernel: audit: type=1006 audit(1746837963.428:1357): pid=5138 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 10 00:46:03.428000 audit[5138]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1ba5ec10 a2=3 a3=0 items=0 ppid=1 pid=5138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:03.512341 kernel: audit: type=1300 audit(1746837963.428:1357): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1ba5ec10 a2=3 a3=0 items=0 ppid=1 pid=5138 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:03.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:03.530054 systemd[1]: run-containerd-runc-k8s.io-eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e-runc.nVZCnA.mount: Deactivated successfully. May 10 00:46:03.530467 kernel: audit: type=1327 audit(1746837963.428:1357): proctitle=737368643A20636F7265205B707269765D May 10 00:46:03.464000 audit[5138]: USER_START pid=5138 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.568194 kernel: audit: type=1105 audit(1746837963.464:1358): pid=5138 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.594497 kernel: audit: type=1103 audit(1746837963.475:1359): pid=5141 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.475000 audit[5141]: CRED_ACQ pid=5141 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.762085 sshd[5138]: pam_unix(sshd:session): session closed for user core May 10 00:46:03.798281 kernel: audit: type=1106 audit(1746837963.764:1360): pid=5138 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.764000 audit[5138]: USER_END pid=5138 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.764000 audit[5138]: CRED_DISP pid=5138 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:03.800805 systemd[1]: sshd@9-10.128.0.17:22-147.75.109.163:49456.service: Deactivated successfully. May 10 00:46:03.802057 systemd[1]: session-9.scope: Deactivated successfully. May 10 00:46:03.805315 systemd-logind[1227]: Session 9 logged out. Waiting for processes to exit. May 10 00:46:03.807257 systemd-logind[1227]: Removed session 9. May 10 00:46:03.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.128.0.17:22-147.75.109.163:49456 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:03.824290 kernel: audit: type=1104 audit(1746837963.764:1361): pid=5138 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:06.132000 audit[2682]: USER_AUTH pid=2682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=111.161.65.209 addr=111.161.65.209 terminal=ssh res=failed' May 10 00:46:06.133641 sshd[2682]: Failed password for root from 111.161.65.209 port 45860 ssh2 May 10 00:46:08.340117 sshd[2682]: Connection closed by authenticating user root 111.161.65.209 port 45860 [preauth] May 10 00:46:08.342025 systemd[1]: sshd@7-10.128.0.17:22-111.161.65.209:45860.service: Deactivated successfully. May 10 00:46:08.349051 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 00:46:08.349205 kernel: audit: type=1131 audit(1746837968.341:1364): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.17:22-111.161.65.209:45860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:08.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.128.0.17:22-111.161.65.209:45860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:08.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.17:22-147.75.109.163:39182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:08.810857 systemd[1]: Started sshd@10-10.128.0.17:22-147.75.109.163:39182.service. May 10 00:46:08.837329 kernel: audit: type=1130 audit(1746837968.810:1365): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.17:22-147.75.109.163:39182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:09.146626 kernel: audit: type=1101 audit(1746837969.111:1366): pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.111000 audit[5172]: USER_ACCT pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.144587 sshd[5172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:09.147459 sshd[5172]: Accepted publickey for core from 147.75.109.163 port 39182 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:09.142000 audit[5172]: CRED_ACQ pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.177293 kernel: audit: type=1103 audit(1746837969.142:1367): pid=5172 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.186284 systemd-logind[1227]: New session 10 of user core. May 10 00:46:09.187426 systemd[1]: Started session-10.scope. May 10 00:46:09.142000 audit[5172]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe271d2460 a2=3 a3=0 items=0 ppid=1 pid=5172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.224739 kernel: audit: type=1006 audit(1746837969.142:1368): pid=5172 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 00:46:09.224919 kernel: audit: type=1300 audit(1746837969.142:1368): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe271d2460 a2=3 a3=0 items=0 ppid=1 pid=5172 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.142000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:09.234545 kernel: audit: type=1327 audit(1746837969.142:1368): proctitle=737368643A20636F7265205B707269765D May 10 00:46:09.195000 audit[5172]: USER_START pid=5172 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.267196 kernel: audit: type=1105 audit(1746837969.195:1369): pid=5172 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.201000 audit[5174]: CRED_ACQ pid=5174 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.268263 kernel: audit: type=1103 audit(1746837969.201:1370): pid=5174 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.460991 sshd[5172]: pam_unix(sshd:session): session closed for user core May 10 00:46:09.496245 kernel: audit: type=1106 audit(1746837969.462:1371): pid=5172 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.462000 audit[5172]: USER_END pid=5172 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.499245 kubelet[2110]: I0510 00:46:09.497384 2110 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:46:09.498381 systemd-logind[1227]: Session 10 logged out. Waiting for processes to exit. May 10 00:46:09.462000 audit[5172]: CRED_DISP pid=5172 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.510758 systemd[1]: Started sshd@11-10.128.0.17:22-147.75.109.163:39198.service. May 10 00:46:09.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.17:22-147.75.109.163:39198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:09.511959 systemd[1]: sshd@10-10.128.0.17:22-147.75.109.163:39182.service: Deactivated successfully. May 10 00:46:09.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.128.0.17:22-147.75.109.163:39182 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:09.515084 systemd[1]: session-10.scope: Deactivated successfully. May 10 00:46:09.521394 systemd-logind[1227]: Removed session 10. May 10 00:46:09.602000 audit[5190]: NETFILTER_CFG table=filter:113 family=2 entries=8 op=nft_register_rule pid=5190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:09.602000 audit[5190]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff52d444a0 a2=0 a3=7fff52d4448c items=0 ppid=2301 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.602000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:09.607000 audit[5190]: NETFILTER_CFG table=nat:114 family=2 entries=34 op=nft_register_chain pid=5190 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:09.607000 audit[5190]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff52d444a0 a2=0 a3=7fff52d4448c items=0 ppid=2301 pid=5190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:09.813000 audit[5184]: USER_ACCT pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.816482 sshd[5184]: Accepted publickey for core from 147.75.109.163 port 39198 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:09.815000 audit[5184]: CRED_ACQ pid=5184 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.815000 audit[5184]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd71606c50 a2=3 a3=0 items=0 ppid=1 pid=5184 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:09.815000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:09.817628 sshd[5184]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:09.826998 systemd-logind[1227]: New session 11 of user core. May 10 00:46:09.827845 systemd[1]: Started session-11.scope. May 10 00:46:09.834000 audit[5184]: USER_START pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:09.837000 audit[5191]: CRED_ACQ pid=5191 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.163021 sshd[5184]: pam_unix(sshd:session): session closed for user core May 10 00:46:10.164000 audit[5184]: USER_END pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.165000 audit[5184]: CRED_DISP pid=5184 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.168895 systemd-logind[1227]: Session 11 logged out. Waiting for processes to exit. May 10 00:46:10.169453 systemd[1]: sshd@11-10.128.0.17:22-147.75.109.163:39198.service: Deactivated successfully. May 10 00:46:10.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.128.0.17:22-147.75.109.163:39198 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:10.170672 systemd[1]: session-11.scope: Deactivated successfully. May 10 00:46:10.173058 systemd-logind[1227]: Removed session 11. May 10 00:46:10.213790 systemd[1]: Started sshd@12-10.128.0.17:22-147.75.109.163:39210.service. May 10 00:46:10.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.17:22-147.75.109.163:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:10.512000 audit[5199]: USER_ACCT pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.513739 sshd[5199]: Accepted publickey for core from 147.75.109.163 port 39210 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:10.514000 audit[5199]: CRED_ACQ pid=5199 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.514000 audit[5199]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe56c2bab0 a2=3 a3=0 items=0 ppid=1 pid=5199 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:10.514000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:10.516276 sshd[5199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:10.524441 systemd-logind[1227]: New session 12 of user core. May 10 00:46:10.525349 systemd[1]: Started session-12.scope. May 10 00:46:10.533000 audit[5199]: USER_START pid=5199 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.536000 audit[5201]: CRED_ACQ pid=5201 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.815988 sshd[5199]: pam_unix(sshd:session): session closed for user core May 10 00:46:10.817000 audit[5199]: USER_END pid=5199 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.817000 audit[5199]: CRED_DISP pid=5199 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:10.822593 systemd-logind[1227]: Session 12 logged out. Waiting for processes to exit. May 10 00:46:10.824657 systemd[1]: sshd@12-10.128.0.17:22-147.75.109.163:39210.service: Deactivated successfully. May 10 00:46:10.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.128.0.17:22-147.75.109.163:39210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:10.825920 systemd[1]: session-12.scope: Deactivated successfully. May 10 00:46:10.828360 systemd-logind[1227]: Removed session 12. May 10 00:46:11.746241 kubelet[2110]: I0510 00:46:11.746017 2110 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 00:46:11.817262 env[1215]: time="2025-05-10T00:46:11.816050830Z" level=info msg="StopContainer for \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\" with timeout 30 (s)" May 10 00:46:11.817262 env[1215]: time="2025-05-10T00:46:11.816744129Z" level=info msg="Stop container \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\" with signal terminated" May 10 00:46:11.827000 audit[5211]: NETFILTER_CFG table=filter:115 family=2 entries=8 op=nft_register_rule pid=5211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:11.827000 audit[5211]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffcbad20ea0 a2=0 a3=7ffcbad20e8c items=0 ppid=2301 pid=5211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:11.827000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:11.839000 audit[5211]: NETFILTER_CFG table=nat:116 family=2 entries=40 op=nft_register_chain pid=5211 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:11.839000 audit[5211]: SYSCALL arch=c000003e syscall=46 success=yes exit=13124 a0=3 a1=7ffcbad20ea0 a2=0 a3=7ffcbad20e8c items=0 ppid=2301 pid=5211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:11.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:11.951000 audit: BPF prog-id=204 op=UNLOAD May 10 00:46:11.952007 systemd[1]: cri-containerd-ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153.scope: Deactivated successfully. May 10 00:46:11.952420 systemd[1]: cri-containerd-ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153.scope: Consumed 1.381s CPU time. May 10 00:46:11.954000 audit: BPF prog-id=207 op=UNLOAD May 10 00:46:12.019365 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153-rootfs.mount: Deactivated successfully. May 10 00:46:12.052854 env[1215]: time="2025-05-10T00:46:12.052783559Z" level=info msg="shim disconnected" id=ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153 May 10 00:46:12.052854 env[1215]: time="2025-05-10T00:46:12.052861194Z" level=warning msg="cleaning up after shim disconnected" id=ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153 namespace=k8s.io May 10 00:46:12.052854 env[1215]: time="2025-05-10T00:46:12.052879010Z" level=info msg="cleaning up dead shim" May 10 00:46:12.069677 env[1215]: time="2025-05-10T00:46:12.069616300Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5229 runtime=io.containerd.runc.v2\n" May 10 00:46:12.072852 env[1215]: time="2025-05-10T00:46:12.072779095Z" level=info msg="StopContainer for \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\" returns successfully" May 10 00:46:12.073683 env[1215]: time="2025-05-10T00:46:12.073631900Z" level=info msg="StopPodSandbox for \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\"" May 10 00:46:12.073843 env[1215]: time="2025-05-10T00:46:12.073723333Z" level=info msg="Container to stop \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:12.084790 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6-shm.mount: Deactivated successfully. May 10 00:46:12.092443 systemd[1]: cri-containerd-e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6.scope: Deactivated successfully. May 10 00:46:12.091000 audit: BPF prog-id=158 op=UNLOAD May 10 00:46:12.095000 audit: BPF prog-id=161 op=UNLOAD May 10 00:46:12.111000 audit[5243]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=5243 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:12.111000 audit[5243]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff26ddcf30 a2=0 a3=7fff26ddcf1c items=0 ppid=2301 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.111000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:12.118000 audit[5243]: NETFILTER_CFG table=nat:118 family=2 entries=40 op=nft_unregister_chain pid=5243 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:12.118000 audit[5243]: SYSCALL arch=c000003e syscall=46 success=yes exit=11364 a0=3 a1=7fff26ddcf30 a2=0 a3=7fff26ddcf1c items=0 ppid=2301 pid=5243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.118000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:12.130341 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6-rootfs.mount: Deactivated successfully. May 10 00:46:12.131720 env[1215]: time="2025-05-10T00:46:12.131662875Z" level=info msg="shim disconnected" id=e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6 May 10 00:46:12.131954 env[1215]: time="2025-05-10T00:46:12.131924503Z" level=warning msg="cleaning up after shim disconnected" id=e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6 namespace=k8s.io May 10 00:46:12.132114 env[1215]: time="2025-05-10T00:46:12.132089452Z" level=info msg="cleaning up dead shim" May 10 00:46:12.144025 env[1215]: time="2025-05-10T00:46:12.143971767Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5260 runtime=io.containerd.runc.v2\n" May 10 00:46:12.216894 systemd-networkd[1024]: cali495b0cd11bb: Link DOWN May 10 00:46:12.216908 systemd-networkd[1024]: cali495b0cd11bb: Lost carrier May 10 00:46:12.282000 audit[5304]: NETFILTER_CFG table=filter:119 family=2 entries=48 op=nft_register_rule pid=5304 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:12.282000 audit[5304]: SYSCALL arch=c000003e syscall=46 success=yes exit=7756 a0=3 a1=7fffb72c6a80 a2=0 a3=7fffb72c6a6c items=0 ppid=4184 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:12.282000 audit[5304]: NETFILTER_CFG table=filter:120 family=2 entries=2 op=nft_unregister_chain pid=5304 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:12.282000 audit[5304]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fffb72c6a80 a2=0 a3=5558b2c7c000 items=0 ppid=4184 pid=5304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:12.282000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:12.303685 kubelet[2110]: I0510 00:46:12.302323 2110 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.215 [INFO][5285] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.215 [INFO][5285] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" iface="eth0" netns="/var/run/netns/cni-5e123d13-a8d6-dfc9-a19f-c6e8c4fd8d0e" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.215 [INFO][5285] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" iface="eth0" netns="/var/run/netns/cni-5e123d13-a8d6-dfc9-a19f-c6e8c4fd8d0e" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.230 [INFO][5285] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" after=14.618091ms iface="eth0" netns="/var/run/netns/cni-5e123d13-a8d6-dfc9-a19f-c6e8c4fd8d0e" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.230 [INFO][5285] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.230 [INFO][5285] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.274 [INFO][5294] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.274 [INFO][5294] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.275 [INFO][5294] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.330 [INFO][5294] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.330 [INFO][5294] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.332 [INFO][5294] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:12.335035 env[1215]: 2025-05-10 00:46:12.333 [INFO][5285] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:46:12.336333 env[1215]: time="2025-05-10T00:46:12.336275059Z" level=info msg="TearDown network for sandbox \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\" successfully" May 10 00:46:12.336533 env[1215]: time="2025-05-10T00:46:12.336500908Z" level=info msg="StopPodSandbox for \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\" returns successfully" May 10 00:46:12.343509 systemd[1]: run-netns-cni\x2d5e123d13\x2da8d6\x2ddfc9\x2da19f\x2dc6e8c4fd8d0e.mount: Deactivated successfully. May 10 00:46:12.432915 kubelet[2110]: I0510 00:46:12.432854 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-l5xz7\" (UniqueName: \"kubernetes.io/projected/e9284258-7d98-4c92-a4ab-848849f17105-kube-api-access-l5xz7\") pod \"e9284258-7d98-4c92-a4ab-848849f17105\" (UID: \"e9284258-7d98-4c92-a4ab-848849f17105\") " May 10 00:46:12.433269 kubelet[2110]: I0510 00:46:12.433235 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e9284258-7d98-4c92-a4ab-848849f17105-calico-apiserver-certs\") pod \"e9284258-7d98-4c92-a4ab-848849f17105\" (UID: \"e9284258-7d98-4c92-a4ab-848849f17105\") " May 10 00:46:12.439449 kubelet[2110]: I0510 00:46:12.439364 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/e9284258-7d98-4c92-a4ab-848849f17105-kube-api-access-l5xz7" (OuterVolumeSpecName: "kube-api-access-l5xz7") pod "e9284258-7d98-4c92-a4ab-848849f17105" (UID: "e9284258-7d98-4c92-a4ab-848849f17105"). InnerVolumeSpecName "kube-api-access-l5xz7". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:46:12.444801 systemd[1]: var-lib-kubelet-pods-e9284258\x2d7d98\x2d4c92\x2da4ab\x2d848849f17105-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dl5xz7.mount: Deactivated successfully. May 10 00:46:12.444987 systemd[1]: var-lib-kubelet-pods-e9284258\x2d7d98\x2d4c92\x2da4ab\x2d848849f17105-volumes-kubernetes.io\x7esecret-calico\x2dapiserver\x2dcerts.mount: Deactivated successfully. May 10 00:46:12.447108 kubelet[2110]: I0510 00:46:12.446785 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/e9284258-7d98-4c92-a4ab-848849f17105-calico-apiserver-certs" (OuterVolumeSpecName: "calico-apiserver-certs") pod "e9284258-7d98-4c92-a4ab-848849f17105" (UID: "e9284258-7d98-4c92-a4ab-848849f17105"). InnerVolumeSpecName "calico-apiserver-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:46:12.534718 kubelet[2110]: I0510 00:46:12.534557 2110 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-l5xz7\" (UniqueName: \"kubernetes.io/projected/e9284258-7d98-4c92-a4ab-848849f17105-kube-api-access-l5xz7\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:12.534718 kubelet[2110]: I0510 00:46:12.534616 2110 reconciler_common.go:289] "Volume detached for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e9284258-7d98-4c92-a4ab-848849f17105-calico-apiserver-certs\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:12.809475 systemd[1]: Removed slice kubepods-besteffort-pode9284258_7d98_4c92_a4ab_848849f17105.slice. May 10 00:46:12.809647 systemd[1]: kubepods-besteffort-pode9284258_7d98_4c92_a4ab_848849f17105.slice: Consumed 1.448s CPU time. May 10 00:46:13.133000 audit[5314]: NETFILTER_CFG table=filter:121 family=2 entries=8 op=nft_register_rule pid=5314 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:13.133000 audit[5314]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fffee162c10 a2=0 a3=7fffee162bfc items=0 ppid=2301 pid=5314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.133000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:13.138000 audit[5314]: NETFILTER_CFG table=nat:122 family=2 entries=36 op=nft_register_rule pid=5314 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:13.138000 audit[5314]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fffee162c10 a2=0 a3=7fffee162bfc items=0 ppid=2301 pid=5314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:13.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:14.803957 kubelet[2110]: I0510 00:46:14.803890 2110 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="e9284258-7d98-4c92-a4ab-848849f17105" path="/var/lib/kubelet/pods/e9284258-7d98-4c92-a4ab-848849f17105/volumes" May 10 00:46:15.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.17:22-147.75.109.163:39216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:15.862451 systemd[1]: Started sshd@13-10.128.0.17:22-147.75.109.163:39216.service. May 10 00:46:15.884777 kernel: kauditd_printk_skb: 58 callbacks suppressed May 10 00:46:15.885007 kernel: audit: type=1130 audit(1746837975.861:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.17:22-147.75.109.163:39216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:16.159000 audit[5318]: USER_ACCT pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.191307 kernel: audit: type=1101 audit(1746837976.159:1407): pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.192161 sshd[5318]: Accepted publickey for core from 147.75.109.163 port 39216 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:16.191909 sshd[5318]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:16.190000 audit[5318]: CRED_ACQ pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.204597 systemd[1]: Started session-13.scope. May 10 00:46:16.206677 systemd-logind[1227]: New session 13 of user core. May 10 00:46:16.237025 kernel: audit: type=1103 audit(1746837976.190:1408): pid=5318 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.237353 kernel: audit: type=1006 audit(1746837976.190:1409): pid=5318 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 10 00:46:16.190000 audit[5318]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c0cd770 a2=3 a3=0 items=0 ppid=1 pid=5318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.190000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:16.266352 kernel: audit: type=1300 audit(1746837976.190:1409): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c0cd770 a2=3 a3=0 items=0 ppid=1 pid=5318 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:16.266450 kernel: audit: type=1327 audit(1746837976.190:1409): proctitle=737368643A20636F7265205B707269765D May 10 00:46:16.213000 audit[5318]: USER_START pid=5318 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.276311 kernel: audit: type=1105 audit(1746837976.213:1410): pid=5318 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.219000 audit[5320]: CRED_ACQ pid=5320 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.333082 kernel: audit: type=1103 audit(1746837976.219:1411): pid=5320 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.468907 sshd[5318]: pam_unix(sshd:session): session closed for user core May 10 00:46:16.470000 audit[5318]: USER_END pid=5318 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.478081 systemd[1]: sshd@13-10.128.0.17:22-147.75.109.163:39216.service: Deactivated successfully. May 10 00:46:16.479443 systemd[1]: session-13.scope: Deactivated successfully. May 10 00:46:16.481424 systemd-logind[1227]: Session 13 logged out. Waiting for processes to exit. May 10 00:46:16.483186 systemd-logind[1227]: Removed session 13. May 10 00:46:16.470000 audit[5318]: CRED_DISP pid=5318 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.530761 kernel: audit: type=1106 audit(1746837976.470:1412): pid=5318 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.530947 kernel: audit: type=1104 audit(1746837976.470:1413): pid=5318 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:16.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.128.0.17:22-147.75.109.163:39216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:21.506757 env[1215]: time="2025-05-10T00:46:21.506691285Z" level=info msg="StopContainer for \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\" with timeout 300 (s)" May 10 00:46:21.507483 env[1215]: time="2025-05-10T00:46:21.507198556Z" level=info msg="Stop container \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\" with signal terminated" May 10 00:46:21.521970 systemd[1]: Started sshd@14-10.128.0.17:22-147.75.109.163:47494.service. May 10 00:46:21.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.17:22-147.75.109.163:47494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:21.528691 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:21.528814 kernel: audit: type=1130 audit(1746837981.522:1415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.17:22-147.75.109.163:47494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:21.598000 audit[5370]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=5370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.617265 kernel: audit: type=1325 audit(1746837981.598:1416): table=filter:123 family=2 entries=8 op=nft_register_rule pid=5370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.598000 audit[5370]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd2dd7cee0 a2=0 a3=7ffd2dd7cecc items=0 ppid=2301 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.653252 kernel: audit: type=1300 audit(1746837981.598:1416): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd2dd7cee0 a2=0 a3=7ffd2dd7cecc items=0 ppid=2301 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.598000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.671389 kernel: audit: type=1327 audit(1746837981.598:1416): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.660000 audit[5370]: NETFILTER_CFG table=nat:124 family=2 entries=30 op=nft_register_rule pid=5370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.706095 kernel: audit: type=1325 audit(1746837981.660:1417): table=nat:124 family=2 entries=30 op=nft_register_rule pid=5370 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:21.660000 audit[5370]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd2dd7cee0 a2=0 a3=7ffd2dd7cecc items=0 ppid=2301 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.745252 kernel: audit: type=1300 audit(1746837981.660:1417): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd2dd7cee0 a2=0 a3=7ffd2dd7cecc items=0 ppid=2301 pid=5370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:21.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.776264 kernel: audit: type=1327 audit(1746837981.660:1417): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:21.791277 systemd[1]: run-containerd-runc-k8s.io-005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa-runc.kYP48J.mount: Deactivated successfully. May 10 00:46:21.906000 audit[5367]: USER_ACCT pid=5367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:21.909521 sshd[5367]: Accepted publickey for core from 147.75.109.163 port 47494 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:21.938268 kernel: audit: type=1101 audit(1746837981.906:1418): pid=5367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:21.939321 sshd[5367]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:21.949328 systemd-logind[1227]: New session 14 of user core. May 10 00:46:21.951412 systemd[1]: Started session-14.scope. May 10 00:46:21.937000 audit[5367]: CRED_ACQ pid=5367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:21.995255 kernel: audit: type=1103 audit(1746837981.937:1419): pid=5367 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:21.937000 audit[5367]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde227f020 a2=3 a3=0 items=0 ppid=1 pid=5367 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.019375 kernel: audit: type=1006 audit(1746837981.937:1420): pid=5367 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 10 00:46:21.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:21.960000 audit[5367]: USER_START pid=5367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:21.963000 audit[5407]: CRED_ACQ pid=5407 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:22.106038 env[1215]: time="2025-05-10T00:46:22.105894852Z" level=info msg="StopContainer for \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\" with timeout 30 (s)" May 10 00:46:22.107432 env[1215]: time="2025-05-10T00:46:22.107372769Z" level=info msg="Stop container \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\" with signal terminated" May 10 00:46:22.181470 systemd[1]: cri-containerd-eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e.scope: Deactivated successfully. May 10 00:46:22.181000 audit: BPF prog-id=200 op=UNLOAD May 10 00:46:22.184000 audit: BPF prog-id=203 op=UNLOAD May 10 00:46:22.215321 env[1215]: time="2025-05-10T00:46:22.214857525Z" level=info msg="StopContainer for \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\" with timeout 5 (s)" May 10 00:46:22.215772 env[1215]: time="2025-05-10T00:46:22.215729823Z" level=info msg="Stop container \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\" with signal terminated" May 10 00:46:22.253522 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e-rootfs.mount: Deactivated successfully. May 10 00:46:22.295379 env[1215]: time="2025-05-10T00:46:22.295307781Z" level=info msg="shim disconnected" id=eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e May 10 00:46:22.295379 env[1215]: time="2025-05-10T00:46:22.295383014Z" level=warning msg="cleaning up after shim disconnected" id=eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e namespace=k8s.io May 10 00:46:22.295379 env[1215]: time="2025-05-10T00:46:22.295399697Z" level=info msg="cleaning up dead shim" May 10 00:46:22.312839 env[1215]: time="2025-05-10T00:46:22.312776287Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5444 runtime=io.containerd.runc.v2\n" May 10 00:46:22.315848 env[1215]: time="2025-05-10T00:46:22.315781520Z" level=info msg="StopContainer for \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\" returns successfully" May 10 00:46:22.316586 env[1215]: time="2025-05-10T00:46:22.316524165Z" level=info msg="StopPodSandbox for \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\"" May 10 00:46:22.316734 env[1215]: time="2025-05-10T00:46:22.316629150Z" level=info msg="Container to stop \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:22.322594 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622-shm.mount: Deactivated successfully. May 10 00:46:22.344424 systemd[1]: cri-containerd-005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa.scope: Deactivated successfully. May 10 00:46:22.344791 systemd[1]: cri-containerd-005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa.scope: Consumed 4.188s CPU time. May 10 00:46:22.352575 sshd[5367]: pam_unix(sshd:session): session closed for user core May 10 00:46:22.355000 audit[5367]: USER_END pid=5367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:22.355000 audit[5367]: CRED_DISP pid=5367 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:22.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.128.0.17:22-147.75.109.163:47494 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:22.359492 systemd[1]: sshd@14-10.128.0.17:22-147.75.109.163:47494.service: Deactivated successfully. May 10 00:46:22.365349 systemd[1]: cri-containerd-4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622.scope: Deactivated successfully. May 10 00:46:22.366532 systemd[1]: session-14.scope: Deactivated successfully. May 10 00:46:22.365000 audit: BPF prog-id=142 op=UNLOAD May 10 00:46:22.368000 audit: BPF prog-id=148 op=UNLOAD May 10 00:46:22.370429 systemd-logind[1227]: Session 14 logged out. Waiting for processes to exit. May 10 00:46:22.376497 systemd-logind[1227]: Removed session 14. May 10 00:46:22.409341 env[1215]: time="2025-05-10T00:46:22.409258820Z" level=info msg="shim disconnected" id=005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa May 10 00:46:22.409341 env[1215]: time="2025-05-10T00:46:22.409329972Z" level=warning msg="cleaning up after shim disconnected" id=005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa namespace=k8s.io May 10 00:46:22.409341 env[1215]: time="2025-05-10T00:46:22.409346140Z" level=info msg="cleaning up dead shim" May 10 00:46:22.423592 env[1215]: time="2025-05-10T00:46:22.423523814Z" level=info msg="shim disconnected" id=4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622 May 10 00:46:22.423592 env[1215]: time="2025-05-10T00:46:22.423595363Z" level=warning msg="cleaning up after shim disconnected" id=4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622 namespace=k8s.io May 10 00:46:22.423592 env[1215]: time="2025-05-10T00:46:22.423613041Z" level=info msg="cleaning up dead shim" May 10 00:46:22.445957 env[1215]: time="2025-05-10T00:46:22.445886010Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5488 runtime=io.containerd.runc.v2\n" May 10 00:46:22.448403 env[1215]: time="2025-05-10T00:46:22.448009720Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5495 runtime=io.containerd.runc.v2\n" May 10 00:46:22.464524 env[1215]: time="2025-05-10T00:46:22.464460111Z" level=info msg="StopContainer for \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\" returns successfully" May 10 00:46:22.465691 env[1215]: time="2025-05-10T00:46:22.465623233Z" level=info msg="StopPodSandbox for \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\"" May 10 00:46:22.466060 env[1215]: time="2025-05-10T00:46:22.466009738Z" level=info msg="Container to stop \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:22.466346 env[1215]: time="2025-05-10T00:46:22.466261499Z" level=info msg="Container to stop \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:22.466541 env[1215]: time="2025-05-10T00:46:22.466505552Z" level=info msg="Container to stop \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:22.482478 systemd[1]: cri-containerd-c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3.scope: Deactivated successfully. May 10 00:46:22.482000 audit: BPF prog-id=125 op=UNLOAD May 10 00:46:22.485000 audit: BPF prog-id=128 op=UNLOAD May 10 00:46:22.535904 env[1215]: time="2025-05-10T00:46:22.535747812Z" level=info msg="shim disconnected" id=c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3 May 10 00:46:22.535904 env[1215]: time="2025-05-10T00:46:22.535825108Z" level=warning msg="cleaning up after shim disconnected" id=c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3 namespace=k8s.io May 10 00:46:22.535904 env[1215]: time="2025-05-10T00:46:22.535841209Z" level=info msg="cleaning up dead shim" May 10 00:46:22.573640 env[1215]: time="2025-05-10T00:46:22.573579433Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5553 runtime=io.containerd.runc.v2\n" May 10 00:46:22.580266 env[1215]: time="2025-05-10T00:46:22.580167337Z" level=info msg="TearDown network for sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" successfully" May 10 00:46:22.580674 env[1215]: time="2025-05-10T00:46:22.580632285Z" level=info msg="StopPodSandbox for \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" returns successfully" May 10 00:46:22.607000 audit[5568]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.607000 audit[5568]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdb237bec0 a2=0 a3=7ffdb237beac items=0 ppid=2301 pid=5568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.607000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.612000 audit[5568]: NETFILTER_CFG table=nat:126 family=2 entries=30 op=nft_register_rule pid=5568 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:22.612000 audit[5568]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdb237bec0 a2=0 a3=7ffdb237beac items=0 ppid=2301 pid=5568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:22.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:22.634739 systemd-networkd[1024]: calic784db14222: Link DOWN May 10 00:46:22.634750 systemd-networkd[1024]: calic784db14222: Lost carrier May 10 00:46:22.644915 kubelet[2110]: I0510 00:46:22.643513 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-xtables-lock\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.644915 kubelet[2110]: I0510 00:46:22.643574 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-var-lib-calico\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.644915 kubelet[2110]: I0510 00:46:22.643605 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-var-run-calico\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.644915 kubelet[2110]: I0510 00:46:22.643627 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-bin-dir\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.644915 kubelet[2110]: I0510 00:46:22.643659 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-n45jn\" (UniqueName: \"kubernetes.io/projected/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-kube-api-access-n45jn\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.644915 kubelet[2110]: I0510 00:46:22.643691 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-tigera-ca-bundle\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.645854 kubelet[2110]: I0510 00:46:22.643714 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-log-dir\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.645854 kubelet[2110]: I0510 00:46:22.643745 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-node-certs\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.645854 kubelet[2110]: I0510 00:46:22.643769 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-flexvol-driver-host\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.645854 kubelet[2110]: I0510 00:46:22.643792 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-net-dir\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.645854 kubelet[2110]: I0510 00:46:22.643816 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-policysync\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.645854 kubelet[2110]: I0510 00:46:22.643842 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-lib-modules\") pod \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\" (UID: \"ecb691eb-5a86-4e73-8f0e-04fbb8634b89\") " May 10 00:46:22.646208 kubelet[2110]: I0510 00:46:22.643963 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.646208 kubelet[2110]: I0510 00:46:22.644014 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.646208 kubelet[2110]: I0510 00:46:22.644040 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.646208 kubelet[2110]: I0510 00:46:22.644065 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.646208 kubelet[2110]: I0510 00:46:22.644091 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.649694 kubelet[2110]: I0510 00:46:22.649612 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.654478 kubelet[2110]: I0510 00:46:22.650032 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.654716 kubelet[2110]: I0510 00:46:22.650074 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-policysync" (OuterVolumeSpecName: "policysync") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.654870 kubelet[2110]: I0510 00:46:22.650100 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 10 00:46:22.663399 kubelet[2110]: I0510 00:46:22.662643 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-kube-api-access-n45jn" (OuterVolumeSpecName: "kube-api-access-n45jn") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "kube-api-access-n45jn". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:46:22.679486 kubelet[2110]: I0510 00:46:22.679405 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-node-certs" (OuterVolumeSpecName: "node-certs") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:46:22.679693 kubelet[2110]: I0510 00:46:22.679655 2110 topology_manager.go:215] "Topology Admit Handler" podUID="eabfca76-fe48-4925-8244-12715612025d" podNamespace="calico-system" podName="calico-node-jk74s" May 10 00:46:22.679775 kubelet[2110]: E0510 00:46:22.679741 2110 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="ecb691eb-5a86-4e73-8f0e-04fbb8634b89" containerName="install-cni" May 10 00:46:22.679775 kubelet[2110]: E0510 00:46:22.679758 2110 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="ecb691eb-5a86-4e73-8f0e-04fbb8634b89" containerName="flexvol-driver" May 10 00:46:22.679775 kubelet[2110]: E0510 00:46:22.679770 2110 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="ecb691eb-5a86-4e73-8f0e-04fbb8634b89" containerName="calico-node" May 10 00:46:22.679959 kubelet[2110]: E0510 00:46:22.679783 2110 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="e9284258-7d98-4c92-a4ab-848849f17105" containerName="calico-apiserver" May 10 00:46:22.679959 kubelet[2110]: I0510 00:46:22.679829 2110 memory_manager.go:354] "RemoveStaleState removing state" podUID="e9284258-7d98-4c92-a4ab-848849f17105" containerName="calico-apiserver" May 10 00:46:22.679959 kubelet[2110]: I0510 00:46:22.679842 2110 memory_manager.go:354] "RemoveStaleState removing state" podUID="ecb691eb-5a86-4e73-8f0e-04fbb8634b89" containerName="calico-node" May 10 00:46:22.693993 kubelet[2110]: I0510 00:46:22.693930 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "ecb691eb-5a86-4e73-8f0e-04fbb8634b89" (UID: "ecb691eb-5a86-4e73-8f0e-04fbb8634b89"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:46:22.702461 systemd[1]: Created slice kubepods-besteffort-podeabfca76_fe48_4925_8244_12715612025d.slice. May 10 00:46:22.722000 audit: BPF prog-id=129 op=UNLOAD May 10 00:46:22.722128 systemd[1]: cri-containerd-e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7.scope: Deactivated successfully. May 10 00:46:22.726000 audit: BPF prog-id=132 op=UNLOAD May 10 00:46:22.745135 kubelet[2110]: I0510 00:46:22.745071 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-cni-net-dir\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745395 kubelet[2110]: I0510 00:46:22.745197 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2hhww\" (UniqueName: \"kubernetes.io/projected/eabfca76-fe48-4925-8244-12715612025d-kube-api-access-2hhww\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745395 kubelet[2110]: I0510 00:46:22.745348 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-var-run-calico\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745546 kubelet[2110]: I0510 00:46:22.745406 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-xtables-lock\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745546 kubelet[2110]: I0510 00:46:22.745439 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-policysync\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745546 kubelet[2110]: I0510 00:46:22.745481 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eabfca76-fe48-4925-8244-12715612025d-tigera-ca-bundle\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745546 kubelet[2110]: I0510 00:46:22.745509 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-flexvol-driver-host\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745772 kubelet[2110]: I0510 00:46:22.745547 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-cni-log-dir\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745772 kubelet[2110]: I0510 00:46:22.745581 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/eabfca76-fe48-4925-8244-12715612025d-node-certs\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745772 kubelet[2110]: I0510 00:46:22.745610 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-lib-modules\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745772 kubelet[2110]: I0510 00:46:22.745636 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-cni-bin-dir\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745772 kubelet[2110]: I0510 00:46:22.745669 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/eabfca76-fe48-4925-8244-12715612025d-var-lib-calico\") pod \"calico-node-jk74s\" (UID: \"eabfca76-fe48-4925-8244-12715612025d\") " pod="calico-system/calico-node-jk74s" May 10 00:46:22.745772 kubelet[2110]: I0510 00:46:22.745728 2110 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-n45jn\" (UniqueName: \"kubernetes.io/projected/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-kube-api-access-n45jn\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746132 kubelet[2110]: I0510 00:46:22.745753 2110 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-var-run-calico\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746132 kubelet[2110]: I0510 00:46:22.745775 2110 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-bin-dir\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746132 kubelet[2110]: I0510 00:46:22.745812 2110 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-tigera-ca-bundle\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746132 kubelet[2110]: I0510 00:46:22.745835 2110 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-log-dir\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746132 kubelet[2110]: I0510 00:46:22.745856 2110 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-node-certs\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746132 kubelet[2110]: I0510 00:46:22.745879 2110 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-flexvol-driver-host\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746132 kubelet[2110]: I0510 00:46:22.745901 2110 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-cni-net-dir\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746554 kubelet[2110]: I0510 00:46:22.745923 2110 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-policysync\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746554 kubelet[2110]: I0510 00:46:22.745981 2110 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-lib-modules\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746554 kubelet[2110]: I0510 00:46:22.746029 2110 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-xtables-lock\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.746554 kubelet[2110]: I0510 00:46:22.746049 2110 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/ecb691eb-5a86-4e73-8f0e-04fbb8634b89-var-lib-calico\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:22.763041 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622-rootfs.mount: Deactivated successfully. May 10 00:46:22.763229 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa-rootfs.mount: Deactivated successfully. May 10 00:46:22.763347 systemd[1]: var-lib-kubelet-pods-ecb691eb\x2d5a86\x2d4e73\x2d8f0e\x2d04fbb8634b89-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 10 00:46:22.763464 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3-rootfs.mount: Deactivated successfully. May 10 00:46:22.763559 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3-shm.mount: Deactivated successfully. May 10 00:46:22.763658 systemd[1]: var-lib-kubelet-pods-ecb691eb\x2d5a86\x2d4e73\x2d8f0e\x2d04fbb8634b89-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 10 00:46:22.763767 systemd[1]: var-lib-kubelet-pods-ecb691eb\x2d5a86\x2d4e73\x2d8f0e\x2d04fbb8634b89-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dn45jn.mount: Deactivated successfully. May 10 00:46:22.820392 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7-rootfs.mount: Deactivated successfully. May 10 00:46:22.829464 env[1215]: time="2025-05-10T00:46:22.828738113Z" level=info msg="shim disconnected" id=e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7 May 10 00:46:22.829464 env[1215]: time="2025-05-10T00:46:22.828810851Z" level=warning msg="cleaning up after shim disconnected" id=e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7 namespace=k8s.io May 10 00:46:22.829464 env[1215]: time="2025-05-10T00:46:22.828825102Z" level=info msg="cleaning up dead shim" May 10 00:46:22.828928 systemd[1]: Removed slice kubepods-besteffort-podecb691eb_5a86_4e73_8f0e_04fbb8634b89.slice. May 10 00:46:22.829110 systemd[1]: kubepods-besteffort-podecb691eb_5a86_4e73_8f0e_04fbb8634b89.slice: Consumed 4.892s CPU time. May 10 00:46:22.848729 env[1215]: time="2025-05-10T00:46:22.848588455Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:22Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5592 runtime=io.containerd.runc.v2\n" May 10 00:46:22.875195 env[1215]: time="2025-05-10T00:46:22.875056219Z" level=info msg="StopContainer for \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\" returns successfully" May 10 00:46:22.881480 env[1215]: time="2025-05-10T00:46:22.881419333Z" level=info msg="StopPodSandbox for \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\"" May 10 00:46:22.887258 env[1215]: time="2025-05-10T00:46:22.881531943Z" level=info msg="Container to stop \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 10 00:46:22.886577 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792-shm.mount: Deactivated successfully. May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.627 [INFO][5537] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.629 [INFO][5537] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" iface="eth0" netns="/var/run/netns/cni-beef114f-7ac4-d36c-9da3-86083bfd3cb8" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.632 [INFO][5537] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" iface="eth0" netns="/var/run/netns/cni-beef114f-7ac4-d36c-9da3-86083bfd3cb8" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.650 [INFO][5537] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" after=20.864821ms iface="eth0" netns="/var/run/netns/cni-beef114f-7ac4-d36c-9da3-86083bfd3cb8" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.650 [INFO][5537] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.650 [INFO][5537] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.740 [INFO][5575] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.749 [INFO][5575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.749 [INFO][5575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.974 [INFO][5575] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.974 [INFO][5575] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.977 [INFO][5575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:22.980607 env[1215]: 2025-05-10 00:46:22.978 [INFO][5537] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:46:22.982454 env[1215]: time="2025-05-10T00:46:22.982387260Z" level=info msg="TearDown network for sandbox \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\" successfully" May 10 00:46:22.982000 audit: BPF prog-id=121 op=UNLOAD May 10 00:46:22.982851 systemd[1]: cri-containerd-94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792.scope: Deactivated successfully. May 10 00:46:22.986268 env[1215]: time="2025-05-10T00:46:22.986172798Z" level=info msg="StopPodSandbox for \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\" returns successfully" May 10 00:46:22.987000 audit: BPF prog-id=124 op=UNLOAD May 10 00:46:23.008181 env[1215]: time="2025-05-10T00:46:23.008121730Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jk74s,Uid:eabfca76-fe48-4925-8244-12715612025d,Namespace:calico-system,Attempt:0,}" May 10 00:46:23.039747 env[1215]: time="2025-05-10T00:46:23.039685528Z" level=info msg="shim disconnected" id=94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792 May 10 00:46:23.040106 env[1215]: time="2025-05-10T00:46:23.040050182Z" level=warning msg="cleaning up after shim disconnected" id=94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792 namespace=k8s.io May 10 00:46:23.042644 env[1215]: time="2025-05-10T00:46:23.042604510Z" level=info msg="cleaning up dead shim" May 10 00:46:23.051685 kubelet[2110]: I0510 00:46:23.048573 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/717a7e75-4b38-438f-a17d-8863eee7015a-tigera-ca-bundle\") pod \"717a7e75-4b38-438f-a17d-8863eee7015a\" (UID: \"717a7e75-4b38-438f-a17d-8863eee7015a\") " May 10 00:46:23.051685 kubelet[2110]: I0510 00:46:23.048634 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-f68pw\" (UniqueName: \"kubernetes.io/projected/717a7e75-4b38-438f-a17d-8863eee7015a-kube-api-access-f68pw\") pod \"717a7e75-4b38-438f-a17d-8863eee7015a\" (UID: \"717a7e75-4b38-438f-a17d-8863eee7015a\") " May 10 00:46:23.078077 kubelet[2110]: I0510 00:46:23.077984 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/717a7e75-4b38-438f-a17d-8863eee7015a-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "717a7e75-4b38-438f-a17d-8863eee7015a" (UID: "717a7e75-4b38-438f-a17d-8863eee7015a"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:46:23.081394 env[1215]: time="2025-05-10T00:46:23.080558614Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:23.081394 env[1215]: time="2025-05-10T00:46:23.080613176Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:23.081394 env[1215]: time="2025-05-10T00:46:23.080631903Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:23.081740 env[1215]: time="2025-05-10T00:46:23.081464569Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec pid=5637 runtime=io.containerd.runc.v2 May 10 00:46:23.089134 env[1215]: time="2025-05-10T00:46:23.089073173Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5632 runtime=io.containerd.runc.v2\n" May 10 00:46:23.096174 kubelet[2110]: I0510 00:46:23.096120 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/717a7e75-4b38-438f-a17d-8863eee7015a-kube-api-access-f68pw" (OuterVolumeSpecName: "kube-api-access-f68pw") pod "717a7e75-4b38-438f-a17d-8863eee7015a" (UID: "717a7e75-4b38-438f-a17d-8863eee7015a"). InnerVolumeSpecName "kube-api-access-f68pw". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:46:23.104298 env[1215]: time="2025-05-10T00:46:23.102740485Z" level=info msg="TearDown network for sandbox \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\" successfully" May 10 00:46:23.104298 env[1215]: time="2025-05-10T00:46:23.102793420Z" level=info msg="StopPodSandbox for \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\" returns successfully" May 10 00:46:23.138965 systemd[1]: Started cri-containerd-33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec.scope. May 10 00:46:23.149034 kubelet[2110]: I0510 00:46:23.148953 2110 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/717a7e75-4b38-438f-a17d-8863eee7015a-tigera-ca-bundle\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:23.149034 kubelet[2110]: I0510 00:46:23.148999 2110 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-f68pw\" (UniqueName: \"kubernetes.io/projected/717a7e75-4b38-438f-a17d-8863eee7015a-kube-api-access-f68pw\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:23.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.178000 audit: BPF prog-id=219 op=LOAD May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=5637 pid=5657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333633762306463383136346338613135613835393737316231616263 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=5637 pid=5657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333633762306463383136346338613135613835393737316231616263 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit: BPF prog-id=220 op=LOAD May 10 00:46:23.179000 audit[5657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003b10a0 items=0 ppid=5637 pid=5657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333633762306463383136346338613135613835393737316231616263 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.179000 audit: BPF prog-id=221 op=LOAD May 10 00:46:23.179000 audit[5657]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003b10e8 items=0 ppid=5637 pid=5657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333633762306463383136346338613135613835393737316231616263 May 10 00:46:23.179000 audit: BPF prog-id=221 op=UNLOAD May 10 00:46:23.179000 audit: BPF prog-id=220 op=UNLOAD May 10 00:46:23.180000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { perfmon } for pid=5657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit[5657]: AVC avc: denied { bpf } for pid=5657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.180000 audit: BPF prog-id=222 op=LOAD May 10 00:46:23.180000 audit[5657]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003b14f8 items=0 ppid=5637 pid=5657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333633762306463383136346338613135613835393737316231616263 May 10 00:46:23.208629 env[1215]: time="2025-05-10T00:46:23.208523720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-jk74s,Uid:eabfca76-fe48-4925-8244-12715612025d,Namespace:calico-system,Attempt:0,} returns sandbox id \"33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec\"" May 10 00:46:23.212942 env[1215]: time="2025-05-10T00:46:23.212883671Z" level=info msg="CreateContainer within sandbox \"33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 00:46:23.218000 audit[5681]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=5681 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:23.218000 audit[5681]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc53fc4e10 a2=0 a3=7ffc53fc4dfc items=0 ppid=2301 pid=5681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.218000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:23.226000 audit[5681]: NETFILTER_CFG table=nat:128 family=2 entries=27 op=nft_unregister_chain pid=5681 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:23.226000 audit[5681]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffc53fc4e10 a2=0 a3=7ffc53fc4dfc items=0 ppid=2301 pid=5681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:23.231088 env[1215]: time="2025-05-10T00:46:23.231000338Z" level=info msg="CreateContainer within sandbox \"33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8dc4d5f4ecf0350ee8f5629bde11bf8df073eb755e7f57b8d28b4344fefdcfda\"" May 10 00:46:23.232065 env[1215]: time="2025-05-10T00:46:23.232009157Z" level=info msg="StartContainer for \"8dc4d5f4ecf0350ee8f5629bde11bf8df073eb755e7f57b8d28b4344fefdcfda\"" May 10 00:46:23.249370 kubelet[2110]: I0510 00:46:23.249316 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cef0c2fe-b594-4cfb-b132-a18745d9c854-tigera-ca-bundle\") pod \"cef0c2fe-b594-4cfb-b132-a18745d9c854\" (UID: \"cef0c2fe-b594-4cfb-b132-a18745d9c854\") " May 10 00:46:23.249606 kubelet[2110]: I0510 00:46:23.249385 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-jt88q\" (UniqueName: \"kubernetes.io/projected/cef0c2fe-b594-4cfb-b132-a18745d9c854-kube-api-access-jt88q\") pod \"cef0c2fe-b594-4cfb-b132-a18745d9c854\" (UID: \"cef0c2fe-b594-4cfb-b132-a18745d9c854\") " May 10 00:46:23.249606 kubelet[2110]: I0510 00:46:23.249427 2110 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cef0c2fe-b594-4cfb-b132-a18745d9c854-typha-certs\") pod \"cef0c2fe-b594-4cfb-b132-a18745d9c854\" (UID: \"cef0c2fe-b594-4cfb-b132-a18745d9c854\") " May 10 00:46:23.268301 kubelet[2110]: I0510 00:46:23.268242 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/cef0c2fe-b594-4cfb-b132-a18745d9c854-kube-api-access-jt88q" (OuterVolumeSpecName: "kube-api-access-jt88q") pod "cef0c2fe-b594-4cfb-b132-a18745d9c854" (UID: "cef0c2fe-b594-4cfb-b132-a18745d9c854"). InnerVolumeSpecName "kube-api-access-jt88q". PluginName "kubernetes.io/projected", VolumeGidValue "" May 10 00:46:23.270997 kubelet[2110]: I0510 00:46:23.270948 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/cef0c2fe-b594-4cfb-b132-a18745d9c854-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "cef0c2fe-b594-4cfb-b132-a18745d9c854" (UID: "cef0c2fe-b594-4cfb-b132-a18745d9c854"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 10 00:46:23.280849 systemd[1]: Started cri-containerd-8dc4d5f4ecf0350ee8f5629bde11bf8df073eb755e7f57b8d28b4344fefdcfda.scope. May 10 00:46:23.284019 kubelet[2110]: I0510 00:46:23.283971 2110 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/cef0c2fe-b594-4cfb-b132-a18745d9c854-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "cef0c2fe-b594-4cfb-b132-a18745d9c854" (UID: "cef0c2fe-b594-4cfb-b132-a18745d9c854"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4d10f27a88 items=0 ppid=5637 pid=5689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864633464356634656366303335306565386635363239626465313162 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit: BPF prog-id=223 op=LOAD May 10 00:46:23.313000 audit[5689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022ccd8 items=0 ppid=5637 pid=5689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864633464356634656366303335306565386635363239626465313162 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.313000 audit: BPF prog-id=224 op=LOAD May 10 00:46:23.313000 audit[5689]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022cd28 items=0 ppid=5637 pid=5689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.313000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864633464356634656366303335306565386635363239626465313162 May 10 00:46:23.314000 audit: BPF prog-id=224 op=UNLOAD May 10 00:46:23.314000 audit: BPF prog-id=223 op=UNLOAD May 10 00:46:23.314000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { perfmon } for pid=5689 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit[5689]: AVC avc: denied { bpf } for pid=5689 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:23.314000 audit: BPF prog-id=225 op=LOAD May 10 00:46:23.314000 audit[5689]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022cdb8 items=0 ppid=5637 pid=5689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:23.314000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3864633464356634656366303335306565386635363239626465313162 May 10 00:46:23.349812 kubelet[2110]: I0510 00:46:23.349749 2110 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cef0c2fe-b594-4cfb-b132-a18745d9c854-tigera-ca-bundle\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:23.350044 kubelet[2110]: I0510 00:46:23.349825 2110 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-jt88q\" (UniqueName: \"kubernetes.io/projected/cef0c2fe-b594-4cfb-b132-a18745d9c854-kube-api-access-jt88q\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:23.350044 kubelet[2110]: I0510 00:46:23.349844 2110 reconciler_common.go:289] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/cef0c2fe-b594-4cfb-b132-a18745d9c854-typha-certs\") on node \"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb\" DevicePath \"\"" May 10 00:46:23.356433 kubelet[2110]: I0510 00:46:23.356393 2110 scope.go:117] "RemoveContainer" containerID="eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e" May 10 00:46:23.369773 systemd[1]: Removed slice kubepods-besteffort-pod717a7e75_4b38_438f_a17d_8863eee7015a.slice. May 10 00:46:23.378996 env[1215]: time="2025-05-10T00:46:23.378942742Z" level=info msg="RemoveContainer for \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\"" May 10 00:46:23.387151 env[1215]: time="2025-05-10T00:46:23.387071052Z" level=info msg="StartContainer for \"8dc4d5f4ecf0350ee8f5629bde11bf8df073eb755e7f57b8d28b4344fefdcfda\" returns successfully" May 10 00:46:23.412654 env[1215]: time="2025-05-10T00:46:23.406754473Z" level=info msg="RemoveContainer for \"eef093397b39dc5bf8aed278a6460c0ddc6b33eb9fd2f99e1223207dc081798e\" returns successfully" May 10 00:46:23.413359 kubelet[2110]: I0510 00:46:23.413308 2110 scope.go:117] "RemoveContainer" containerID="005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa" May 10 00:46:23.417045 systemd[1]: Removed slice kubepods-besteffort-podcef0c2fe_b594_4cfb_b132_a18745d9c854.slice. May 10 00:46:23.418792 env[1215]: time="2025-05-10T00:46:23.418749755Z" level=info msg="RemoveContainer for \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\"" May 10 00:46:23.424565 env[1215]: time="2025-05-10T00:46:23.424518599Z" level=info msg="RemoveContainer for \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\" returns successfully" May 10 00:46:23.425151 kubelet[2110]: I0510 00:46:23.425126 2110 scope.go:117] "RemoveContainer" containerID="7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d" May 10 00:46:23.429019 env[1215]: time="2025-05-10T00:46:23.428976234Z" level=info msg="RemoveContainer for \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\"" May 10 00:46:23.434684 env[1215]: time="2025-05-10T00:46:23.434624175Z" level=info msg="RemoveContainer for \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\" returns successfully" May 10 00:46:23.435131 kubelet[2110]: I0510 00:46:23.435100 2110 scope.go:117] "RemoveContainer" containerID="49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d" May 10 00:46:23.439536 env[1215]: time="2025-05-10T00:46:23.439485221Z" level=info msg="RemoveContainer for \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\"" May 10 00:46:23.457348 env[1215]: time="2025-05-10T00:46:23.457271514Z" level=info msg="RemoveContainer for \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\" returns successfully" May 10 00:46:23.461274 kubelet[2110]: I0510 00:46:23.457961 2110 scope.go:117] "RemoveContainer" containerID="005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa" May 10 00:46:23.461274 kubelet[2110]: E0510 00:46:23.458883 2110 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\": not found" containerID="005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa" May 10 00:46:23.461274 kubelet[2110]: I0510 00:46:23.458945 2110 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa"} err="failed to get container status \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\": rpc error: code = NotFound desc = an error occurred when try to find container \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\": not found" May 10 00:46:23.461274 kubelet[2110]: I0510 00:46:23.458977 2110 scope.go:117] "RemoveContainer" containerID="7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d" May 10 00:46:23.461274 kubelet[2110]: E0510 00:46:23.459608 2110 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\": not found" containerID="7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d" May 10 00:46:23.461274 kubelet[2110]: I0510 00:46:23.459662 2110 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d"} err="failed to get container status \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\": rpc error: code = NotFound desc = an error occurred when try to find container \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\": not found" May 10 00:46:23.461274 kubelet[2110]: I0510 00:46:23.459688 2110 scope.go:117] "RemoveContainer" containerID="49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d" May 10 00:46:23.461843 env[1215]: time="2025-05-10T00:46:23.458470670Z" level=error msg="ContainerStatus for \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"005ac258ab17ed12a7f1a455ed0d7f6ab100be4c4ec06dd869b10aca9a612aaa\": not found" May 10 00:46:23.461843 env[1215]: time="2025-05-10T00:46:23.459348969Z" level=error msg="ContainerStatus for \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"7abc0647a6663bd079df9d9993dcb067151748cfec51428d8b1477b802a7230d\": not found" May 10 00:46:23.461843 env[1215]: time="2025-05-10T00:46:23.459962277Z" level=error msg="ContainerStatus for \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\": not found" May 10 00:46:23.462043 kubelet[2110]: E0510 00:46:23.461414 2110 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\": not found" containerID="49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d" May 10 00:46:23.462043 kubelet[2110]: I0510 00:46:23.461464 2110 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d"} err="failed to get container status \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\": rpc error: code = NotFound desc = an error occurred when try to find container \"49d0b335adbae32a118532cb20d805ac744c97e6005a7e8c2b64e65d53d0eb6d\": not found" May 10 00:46:23.462043 kubelet[2110]: I0510 00:46:23.461490 2110 scope.go:117] "RemoveContainer" containerID="e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7" May 10 00:46:23.465150 env[1215]: time="2025-05-10T00:46:23.465092622Z" level=info msg="RemoveContainer for \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\"" May 10 00:46:23.474793 env[1215]: time="2025-05-10T00:46:23.474727210Z" level=info msg="RemoveContainer for \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\" returns successfully" May 10 00:46:23.477277 kubelet[2110]: I0510 00:46:23.475393 2110 scope.go:117] "RemoveContainer" containerID="e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7" May 10 00:46:23.477277 kubelet[2110]: E0510 00:46:23.476061 2110 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\": not found" containerID="e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7" May 10 00:46:23.477277 kubelet[2110]: I0510 00:46:23.476121 2110 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7"} err="failed to get container status \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\": rpc error: code = NotFound desc = an error occurred when try to find container \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\": not found" May 10 00:46:23.477604 env[1215]: time="2025-05-10T00:46:23.475792426Z" level=error msg="ContainerStatus for \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"e5c40b7cdee0001986e1828f3d3758e243a9ab1b8c200973f9b5a4ccfb5ca9a7\": not found" May 10 00:46:23.496286 systemd[1]: cri-containerd-8dc4d5f4ecf0350ee8f5629bde11bf8df073eb755e7f57b8d28b4344fefdcfda.scope: Deactivated successfully. May 10 00:46:23.500000 audit: BPF prog-id=225 op=UNLOAD May 10 00:46:23.558069 env[1215]: time="2025-05-10T00:46:23.558006671Z" level=info msg="shim disconnected" id=8dc4d5f4ecf0350ee8f5629bde11bf8df073eb755e7f57b8d28b4344fefdcfda May 10 00:46:23.559009 env[1215]: time="2025-05-10T00:46:23.558956290Z" level=warning msg="cleaning up after shim disconnected" id=8dc4d5f4ecf0350ee8f5629bde11bf8df073eb755e7f57b8d28b4344fefdcfda namespace=k8s.io May 10 00:46:23.559251 env[1215]: time="2025-05-10T00:46:23.559203908Z" level=info msg="cleaning up dead shim" May 10 00:46:23.577183 env[1215]: time="2025-05-10T00:46:23.575996835Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5729 runtime=io.containerd.runc.v2\n" May 10 00:46:23.770643 systemd[1]: var-lib-kubelet-pods-717a7e75\x2d4b38\x2d438f\x2da17d\x2d8863eee7015a-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. May 10 00:46:23.770820 systemd[1]: run-netns-cni\x2dbeef114f\x2d7ac4\x2dd36c\x2d9da3\x2d86083bfd3cb8.mount: Deactivated successfully. May 10 00:46:23.770922 systemd[1]: var-lib-kubelet-pods-717a7e75\x2d4b38\x2d438f\x2da17d\x2d8863eee7015a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2df68pw.mount: Deactivated successfully. May 10 00:46:23.771025 systemd[1]: var-lib-kubelet-pods-cef0c2fe\x2db594\x2d4cfb\x2db132\x2da18745d9c854-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. May 10 00:46:23.771139 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792-rootfs.mount: Deactivated successfully. May 10 00:46:23.771268 systemd[1]: var-lib-kubelet-pods-cef0c2fe\x2db594\x2d4cfb\x2db132\x2da18745d9c854-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. May 10 00:46:23.771391 systemd[1]: var-lib-kubelet-pods-cef0c2fe\x2db594\x2d4cfb\x2db132\x2da18745d9c854-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2djt88q.mount: Deactivated successfully. May 10 00:46:24.408342 env[1215]: time="2025-05-10T00:46:24.408285510Z" level=info msg="CreateContainer within sandbox \"33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 00:46:24.446132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1907523097.mount: Deactivated successfully. May 10 00:46:24.452006 env[1215]: time="2025-05-10T00:46:24.451920197Z" level=info msg="CreateContainer within sandbox \"33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7\"" May 10 00:46:24.453091 env[1215]: time="2025-05-10T00:46:24.453035489Z" level=info msg="StartContainer for \"1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7\"" May 10 00:46:24.498854 systemd[1]: Started cri-containerd-1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7.scope. May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9ec8132ef8 items=0 ppid=5637 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363563613734313235366466383536373338363761343561653936 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit: BPF prog-id=226 op=LOAD May 10 00:46:24.524000 audit[5753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00030d3f8 items=0 ppid=5637 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363563613734313235366466383536373338363761343561653936 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.524000 audit: BPF prog-id=227 op=LOAD May 10 00:46:24.524000 audit[5753]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00030d448 items=0 ppid=5637 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363563613734313235366466383536373338363761343561653936 May 10 00:46:24.524000 audit: BPF prog-id=227 op=UNLOAD May 10 00:46:24.525000 audit: BPF prog-id=226 op=UNLOAD May 10 00:46:24.525000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { perfmon } for pid=5753 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit[5753]: AVC avc: denied { bpf } for pid=5753 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:24.525000 audit: BPF prog-id=228 op=LOAD May 10 00:46:24.525000 audit[5753]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00030d4d8 items=0 ppid=5637 pid=5753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:24.525000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363563613734313235366466383536373338363761343561653936 May 10 00:46:24.546469 env[1215]: time="2025-05-10T00:46:24.546399615Z" level=info msg="StartContainer for \"1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7\" returns successfully" May 10 00:46:24.761570 systemd[1]: run-containerd-runc-k8s.io-1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7-runc.2eUY3W.mount: Deactivated successfully. May 10 00:46:24.805526 kubelet[2110]: I0510 00:46:24.805469 2110 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="717a7e75-4b38-438f-a17d-8863eee7015a" path="/var/lib/kubelet/pods/717a7e75-4b38-438f-a17d-8863eee7015a/volumes" May 10 00:46:24.806395 kubelet[2110]: I0510 00:46:24.806359 2110 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="cef0c2fe-b594-4cfb-b132-a18745d9c854" path="/var/lib/kubelet/pods/cef0c2fe-b594-4cfb-b132-a18745d9c854/volumes" May 10 00:46:24.807264 kubelet[2110]: I0510 00:46:24.807197 2110 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="ecb691eb-5a86-4e73-8f0e-04fbb8634b89" path="/var/lib/kubelet/pods/ecb691eb-5a86-4e73-8f0e-04fbb8634b89/volumes" May 10 00:46:25.305613 systemd[1]: cri-containerd-1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7.scope: Deactivated successfully. May 10 00:46:25.309000 audit: BPF prog-id=228 op=UNLOAD May 10 00:46:25.341884 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7-rootfs.mount: Deactivated successfully. May 10 00:46:25.348507 env[1215]: time="2025-05-10T00:46:25.348425432Z" level=info msg="shim disconnected" id=1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7 May 10 00:46:25.348507 env[1215]: time="2025-05-10T00:46:25.348487937Z" level=warning msg="cleaning up after shim disconnected" id=1065ca741256df85673867a45ae964623c48630a83da900c97007fb8709a30d7 namespace=k8s.io May 10 00:46:25.348507 env[1215]: time="2025-05-10T00:46:25.348505982Z" level=info msg="cleaning up dead shim" May 10 00:46:25.362647 env[1215]: time="2025-05-10T00:46:25.361791664Z" level=warning msg="cleanup warnings time=\"2025-05-10T00:46:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5792 runtime=io.containerd.runc.v2\n" May 10 00:46:25.471010 env[1215]: time="2025-05-10T00:46:25.470934171Z" level=info msg="CreateContainer within sandbox \"33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 00:46:25.499161 env[1215]: time="2025-05-10T00:46:25.499081299Z" level=info msg="CreateContainer within sandbox \"33c7b0dc8164c8a15a859771b1abca0b32441bf1009251baab0b323bcf51feec\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fed1ee6ccb2ca92a165d8c84fb7d248f89ba68d037ad2b61c2f9fd9f5e0d761f\"" May 10 00:46:25.500298 env[1215]: time="2025-05-10T00:46:25.500254640Z" level=info msg="StartContainer for \"fed1ee6ccb2ca92a165d8c84fb7d248f89ba68d037ad2b61c2f9fd9f5e0d761f\"" May 10 00:46:25.530553 systemd[1]: Started cri-containerd-fed1ee6ccb2ca92a165d8c84fb7d248f89ba68d037ad2b61c2f9fd9f5e0d761f.scope. May 10 00:46:25.566000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7ffb995904f8 items=0 ppid=5637 pid=5815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643165653663636232636139326131363564386338346662376432 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.566000 audit: BPF prog-id=229 op=LOAD May 10 00:46:25.566000 audit[5815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000400068 items=0 ppid=5637 pid=5815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643165653663636232636139326131363564386338346662376432 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit: BPF prog-id=230 op=LOAD May 10 00:46:25.567000 audit[5815]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0004000b8 items=0 ppid=5637 pid=5815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643165653663636232636139326131363564386338346662376432 May 10 00:46:25.567000 audit: BPF prog-id=230 op=UNLOAD May 10 00:46:25.567000 audit: BPF prog-id=229 op=UNLOAD May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { perfmon } for pid=5815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit[5815]: AVC avc: denied { bpf } for pid=5815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:25.567000 audit: BPF prog-id=231 op=LOAD May 10 00:46:25.567000 audit[5815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000400148 items=0 ppid=5637 pid=5815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:25.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665643165653663636232636139326131363564386338346662376432 May 10 00:46:25.594739 env[1215]: time="2025-05-10T00:46:25.594675261Z" level=info msg="StartContainer for \"fed1ee6ccb2ca92a165d8c84fb7d248f89ba68d037ad2b61c2f9fd9f5e0d761f\" returns successfully" May 10 00:46:25.754117 kubelet[2110]: I0510 00:46:25.754051 2110 topology_manager.go:215] "Topology Admit Handler" podUID="5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61" podNamespace="calico-system" podName="calico-kube-controllers-8b5f8b6b9-p6zhl" May 10 00:46:25.754415 kubelet[2110]: E0510 00:46:25.754154 2110 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="cef0c2fe-b594-4cfb-b132-a18745d9c854" containerName="calico-typha" May 10 00:46:25.754415 kubelet[2110]: E0510 00:46:25.754172 2110 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="717a7e75-4b38-438f-a17d-8863eee7015a" containerName="calico-kube-controllers" May 10 00:46:25.754415 kubelet[2110]: I0510 00:46:25.754225 2110 memory_manager.go:354] "RemoveStaleState removing state" podUID="717a7e75-4b38-438f-a17d-8863eee7015a" containerName="calico-kube-controllers" May 10 00:46:25.754415 kubelet[2110]: I0510 00:46:25.754239 2110 memory_manager.go:354] "RemoveStaleState removing state" podUID="cef0c2fe-b594-4cfb-b132-a18745d9c854" containerName="calico-typha" May 10 00:46:25.779823 systemd[1]: Created slice kubepods-besteffort-pod5a3c1e6c_e3d9_4589_8e27_9ad5d2c2ea61.slice. May 10 00:46:25.873744 kubelet[2110]: I0510 00:46:25.873600 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61-tigera-ca-bundle\") pod \"calico-kube-controllers-8b5f8b6b9-p6zhl\" (UID: \"5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61\") " pod="calico-system/calico-kube-controllers-8b5f8b6b9-p6zhl" May 10 00:46:25.873744 kubelet[2110]: I0510 00:46:25.873681 2110 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bmxqx\" (UniqueName: \"kubernetes.io/projected/5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61-kube-api-access-bmxqx\") pod \"calico-kube-controllers-8b5f8b6b9-p6zhl\" (UID: \"5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61\") " pod="calico-system/calico-kube-controllers-8b5f8b6b9-p6zhl" May 10 00:46:26.084506 env[1215]: time="2025-05-10T00:46:26.084446530Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8b5f8b6b9-p6zhl,Uid:5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61,Namespace:calico-system,Attempt:0,}" May 10 00:46:26.277471 systemd-networkd[1024]: cali11158d09304: Link UP May 10 00:46:26.293158 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 00:46:26.293340 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali11158d09304: link becomes ready May 10 00:46:26.293594 systemd-networkd[1024]: cali11158d09304: Gained carrier May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.152 [INFO][5867] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0 calico-kube-controllers-8b5f8b6b9- calico-system 5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61 1250 0 2025-05-10 00:46:23 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:8b5f8b6b9 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb calico-kube-controllers-8b5f8b6b9-p6zhl eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali11158d09304 [] []}} ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Namespace="calico-system" Pod="calico-kube-controllers-8b5f8b6b9-p6zhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.153 [INFO][5867] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Namespace="calico-system" Pod="calico-kube-controllers-8b5f8b6b9-p6zhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.198 [INFO][5879] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" HandleID="k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.215 [INFO][5879] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" HandleID="k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000290870), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", "pod":"calico-kube-controllers-8b5f8b6b9-p6zhl", "timestamp":"2025-05-10 00:46:26.198443049 +0000 UTC"}, Hostname:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.215 [INFO][5879] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.216 [INFO][5879] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.216 [INFO][5879] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb' May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.218 [INFO][5879] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.224 [INFO][5879] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.232 [INFO][5879] ipam/ipam.go 489: Trying affinity for 192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.235 [INFO][5879] ipam/ipam.go 155: Attempting to load block cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.240 [INFO][5879] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.5.64/26 host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.240 [INFO][5879] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.5.64/26 handle="k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.245 [INFO][5879] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.256 [INFO][5879] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.5.64/26 handle="k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.265 [INFO][5879] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.5.72/26] block=192.168.5.64/26 handle="k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.266 [INFO][5879] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.5.72/26] handle="k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" host="ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb" May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.266 [INFO][5879] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:46:26.323241 env[1215]: 2025-05-10 00:46:26.266 [INFO][5879] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.5.72/26] IPv6=[] ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" HandleID="k8s-pod-network.d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" May 10 00:46:26.324672 env[1215]: 2025-05-10 00:46:26.268 [INFO][5867] cni-plugin/k8s.go 386: Populated endpoint ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Namespace="calico-system" Pod="calico-kube-controllers-8b5f8b6b9-p6zhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0", GenerateName:"calico-kube-controllers-8b5f8b6b9-", Namespace:"calico-system", SelfLink:"", UID:"5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61", ResourceVersion:"1250", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8b5f8b6b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"", Pod:"calico-kube-controllers-8b5f8b6b9-p6zhl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali11158d09304", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:26.324672 env[1215]: 2025-05-10 00:46:26.268 [INFO][5867] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.5.72/32] ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Namespace="calico-system" Pod="calico-kube-controllers-8b5f8b6b9-p6zhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" May 10 00:46:26.324672 env[1215]: 2025-05-10 00:46:26.268 [INFO][5867] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali11158d09304 ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Namespace="calico-system" Pod="calico-kube-controllers-8b5f8b6b9-p6zhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" May 10 00:46:26.324672 env[1215]: 2025-05-10 00:46:26.294 [INFO][5867] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Namespace="calico-system" Pod="calico-kube-controllers-8b5f8b6b9-p6zhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" May 10 00:46:26.324672 env[1215]: 2025-05-10 00:46:26.295 [INFO][5867] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Namespace="calico-system" Pod="calico-kube-controllers-8b5f8b6b9-p6zhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0", GenerateName:"calico-kube-controllers-8b5f8b6b9-", Namespace:"calico-system", SelfLink:"", UID:"5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61", ResourceVersion:"1250", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 0, 46, 23, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"8b5f8b6b9", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-nightly-20250509-2100-6cf0867f062f8fb5b1cb", ContainerID:"d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf", Pod:"calico-kube-controllers-8b5f8b6b9-p6zhl", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.5.72/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali11158d09304", MAC:"62:b1:14:df:09:dc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 00:46:26.324672 env[1215]: 2025-05-10 00:46:26.318 [INFO][5867] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf" Namespace="calico-system" Pod="calico-kube-controllers-8b5f8b6b9-p6zhl" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--8b5f8b6b9--p6zhl-eth0" May 10 00:46:26.349274 env[1215]: time="2025-05-10T00:46:26.349014909Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 00:46:26.351956 env[1215]: time="2025-05-10T00:46:26.351876995Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 00:46:26.352175 env[1215]: time="2025-05-10T00:46:26.352117338Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 00:46:26.359954 env[1215]: time="2025-05-10T00:46:26.359807665Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf pid=5906 runtime=io.containerd.runc.v2 May 10 00:46:26.395431 systemd[1]: Started cri-containerd-d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf.scope. May 10 00:46:26.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.418000 audit: BPF prog-id=232 op=LOAD May 10 00:46:26.420000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.420000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5906 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.420000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431376235653033373835316237343063363136386339643236663331 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=5906 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431376235653033373835316237343063363136386339643236663331 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit: BPF prog-id=233 op=LOAD May 10 00:46:26.434000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00031fd70 items=0 ppid=5906 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431376235653033373835316237343063363136386339643236663331 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit: BPF prog-id=234 op=LOAD May 10 00:46:26.434000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00031fdb8 items=0 ppid=5906 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431376235653033373835316237343063363136386339643236663331 May 10 00:46:26.434000 audit: BPF prog-id=234 op=UNLOAD May 10 00:46:26.434000 audit: BPF prog-id=233 op=UNLOAD May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { perfmon } for pid=5916 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit[5916]: AVC avc: denied { bpf } for pid=5916 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.434000 audit: BPF prog-id=235 op=LOAD May 10 00:46:26.434000 audit[5916]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003881c8 items=0 ppid=5906 pid=5916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431376235653033373835316237343063363136386339643236663331 May 10 00:46:26.494644 kubelet[2110]: I0510 00:46:26.493368 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-jk74s" podStartSLOduration=4.493338509 podStartE2EDuration="4.493338509s" podCreationTimestamp="2025-05-10 00:46:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:26.48755884 +0000 UTC m=+87.872632521" watchObservedRunningTime="2025-05-10 00:46:26.493338509 +0000 UTC m=+87.878412167" May 10 00:46:26.538299 env[1215]: time="2025-05-10T00:46:26.537598079Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-8b5f8b6b9-p6zhl,Uid:5a3c1e6c-e3d9-4589-8e27-9ad5d2c2ea61,Namespace:calico-system,Attempt:0,} returns sandbox id \"d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf\"" May 10 00:46:26.563004 env[1215]: time="2025-05-10T00:46:26.562947378Z" level=info msg="CreateContainer within sandbox \"d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 00:46:26.581723 env[1215]: time="2025-05-10T00:46:26.581635612Z" level=info msg="CreateContainer within sandbox \"d17b5e037851b740c6168c9d26f3134c08f649904c9f72ecd3a1a01dfeedc7bf\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"fbef9bd29c68abe03d63947b73747ff3ef166b5c1287f5b51ec9381996d54418\"" May 10 00:46:26.583100 env[1215]: time="2025-05-10T00:46:26.583045620Z" level=info msg="StartContainer for \"fbef9bd29c68abe03d63947b73747ff3ef166b5c1287f5b51ec9381996d54418\"" May 10 00:46:26.623027 systemd[1]: Started cri-containerd-fbef9bd29c68abe03d63947b73747ff3ef166b5c1287f5b51ec9381996d54418.scope. May 10 00:46:26.689805 kernel: kauditd_printk_skb: 274 callbacks suppressed May 10 00:46:26.689996 kernel: audit: type=1400 audit(1746837986.662:1496): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.733753 kernel: audit: type=1400 audit(1746837986.662:1497): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.733960 kernel: audit: type=1400 audit(1746837986.662:1498): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.734010 kernel: audit: type=1400 audit(1746837986.662:1499): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.772737 kernel: audit: type=1400 audit(1746837986.662:1500): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.806388 kernel: audit: type=1400 audit(1746837986.662:1501): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.829310 kernel: audit: type=1400 audit(1746837986.662:1502): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.853262 kernel: audit: type=1400 audit(1746837986.662:1503): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.890284 kernel: audit: type=1400 audit(1746837986.662:1504): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.662000 audit: BPF prog-id=236 op=LOAD May 10 00:46:26.914057 kernel: audit: type=1400 audit(1746837986.662:1505): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5906 pid=5968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656639626432396336386162653033643633393437623733373437 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=5906 pid=5968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656639626432396336386162653033643633393437623733373437 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.664000 audit: BPF prog-id=237 op=LOAD May 10 00:46:26.664000 audit[5968]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018bf80 items=0 ppid=5906 pid=5968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.664000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656639626432396336386162653033643633393437623733373437 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.712000 audit: BPF prog-id=238 op=LOAD May 10 00:46:26.712000 audit[5968]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018bfc8 items=0 ppid=5906 pid=5968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656639626432396336386162653033643633393437623733373437 May 10 00:46:26.731000 audit: BPF prog-id=238 op=UNLOAD May 10 00:46:26.731000 audit: BPF prog-id=237 op=UNLOAD May 10 00:46:26.731000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { perfmon } for pid=5968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit[5968]: AVC avc: denied { bpf } for pid=5968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:26.731000 audit: BPF prog-id=239 op=LOAD May 10 00:46:26.731000 audit[5968]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001be3d8 items=0 ppid=5906 pid=5968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662656639626432396336386162653033643633393437623733373437 May 10 00:46:26.920002 env[1215]: time="2025-05-10T00:46:26.914828377Z" level=info msg="StartContainer for \"fbef9bd29c68abe03d63947b73747ff3ef166b5c1287f5b51ec9381996d54418\" returns successfully" May 10 00:46:26.946000 audit[5995]: NETFILTER_CFG table=filter:129 family=2 entries=9 op=nft_register_rule pid=5995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:26.946000 audit[5995]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd2cf60e00 a2=0 a3=7ffd2cf60dec items=0 ppid=2301 pid=5995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.946000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:26.952000 audit[5995]: NETFILTER_CFG table=nat:130 family=2 entries=27 op=nft_register_chain pid=5995 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:26.952000 audit[5995]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd2cf60e00 a2=0 a3=7ffd2cf60dec items=0 ppid=2301 pid=5995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:26.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:27.064000 audit[6020]: AVC avc: denied { write } for pid=6020 comm="tee" name="fd" dev="proc" ino=33632 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:27.064000 audit[6020]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcf3b4f9d0 a2=241 a3=1b6 items=1 ppid=6013 pid=6020 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.064000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 00:46:27.064000 audit: PATH item=0 name="/dev/fd/63" inode=33598 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:27.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:27.075000 audit[6058]: AVC avc: denied { write } for pid=6058 comm="tee" name="fd" dev="proc" ino=34016 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:27.075000 audit[6058]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdaf1b49c0 a2=241 a3=1b6 items=1 ppid=6008 pid=6058 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.075000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 00:46:27.075000 audit: PATH item=0 name="/dev/fd/63" inode=33638 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:27.075000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:27.082000 audit[6060]: AVC avc: denied { write } for pid=6060 comm="tee" name="fd" dev="proc" ino=34020 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:27.082000 audit[6060]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcea5529c1 a2=241 a3=1b6 items=1 ppid=6017 pid=6060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.082000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 00:46:27.082000 audit: PATH item=0 name="/dev/fd/63" inode=33643 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:27.082000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:27.091000 audit[6053]: AVC avc: denied { write } for pid=6053 comm="tee" name="fd" dev="proc" ino=34030 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:27.091000 audit[6053]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff15dfe9d1 a2=241 a3=1b6 items=1 ppid=6004 pid=6053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.091000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 00:46:27.091000 audit: PATH item=0 name="/dev/fd/63" inode=33628 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:27.091000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:27.116000 audit[6067]: AVC avc: denied { write } for pid=6067 comm="tee" name="fd" dev="proc" ino=34039 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:27.116000 audit[6067]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff34ca79d0 a2=241 a3=1b6 items=1 ppid=6005 pid=6067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.116000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 00:46:27.116000 audit: PATH item=0 name="/dev/fd/63" inode=33645 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:27.116000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:27.118000 audit[6074]: AVC avc: denied { write } for pid=6074 comm="tee" name="fd" dev="proc" ino=34043 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:27.118000 audit[6074]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe6bbd59d2 a2=241 a3=1b6 items=1 ppid=6022 pid=6074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.118000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 00:46:27.118000 audit: PATH item=0 name="/dev/fd/63" inode=33650 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:27.118000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:27.148000 audit[6076]: AVC avc: denied { write } for pid=6076 comm="tee" name="fd" dev="proc" ino=33655 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 00:46:27.148000 audit[6076]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff9122a9d0 a2=241 a3=1b6 items=1 ppid=6024 pid=6076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.148000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 00:46:27.148000 audit: PATH item=0 name="/dev/fd/63" inode=33651 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 00:46:27.148000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 00:46:27.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.17:22-147.75.109.163:59808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:27.407499 systemd[1]: Started sshd@15-10.128.0.17:22-147.75.109.163:59808.service. May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit: BPF prog-id=240 op=LOAD May 10 00:46:27.419000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffca031e1a0 a2=98 a3=3 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.419000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.419000 audit: BPF prog-id=240 op=UNLOAD May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit: BPF prog-id=241 op=LOAD May 10 00:46:27.419000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca031df80 a2=74 a3=540051 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.419000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.419000 audit: BPF prog-id=241 op=UNLOAD May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.419000 audit: BPF prog-id=242 op=LOAD May 10 00:46:27.419000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca031dfb0 a2=94 a3=2 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.419000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.420000 audit: BPF prog-id=242 op=UNLOAD May 10 00:46:27.506266 kubelet[2110]: I0510 00:46:27.501943 2110 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-8b5f8b6b9-p6zhl" podStartSLOduration=4.501913389 podStartE2EDuration="4.501913389s" podCreationTimestamp="2025-05-10 00:46:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 00:46:27.500564758 +0000 UTC m=+88.885638416" watchObservedRunningTime="2025-05-10 00:46:27.501913389 +0000 UTC m=+88.886987040" May 10 00:46:27.558177 systemd[1]: run-containerd-runc-k8s.io-fed1ee6ccb2ca92a165d8c84fb7d248f89ba68d037ad2b61c2f9fd9f5e0d761f-runc.FlzOSU.mount: Deactivated successfully. May 10 00:46:27.712593 systemd-networkd[1024]: cali11158d09304: Gained IPv6LL May 10 00:46:27.732000 audit[6100]: USER_ACCT pid=6100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:27.737712 sshd[6100]: Accepted publickey for core from 147.75.109.163 port 59808 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:27.737000 audit[6100]: CRED_ACQ pid=6100 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:27.737000 audit[6100]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefdc8f2e0 a2=3 a3=0 items=0 ppid=1 pid=6100 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.737000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:27.740209 sshd[6100]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:27.749861 systemd[1]: Started session-15.scope. May 10 00:46:27.750943 systemd-logind[1227]: New session 15 of user core. May 10 00:46:27.759000 audit[6100]: USER_START pid=6100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:27.762000 audit[6157]: CRED_ACQ pid=6157 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:27.801000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit: BPF prog-id=243 op=LOAD May 10 00:46:27.801000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffca031de70 a2=40 a3=1 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.801000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.801000 audit: BPF prog-id=243 op=UNLOAD May 10 00:46:27.801000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.801000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffca031df40 a2=50 a3=7ffca031e020 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.801000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.817000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.817000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca031de80 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.817000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.818000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.818000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca031deb0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.818000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.818000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.818000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca031ddc0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.818000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.818000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.818000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca031ded0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.818000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.819000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.819000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca031deb0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.819000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.819000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca031dea0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.819000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.819000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca031ded0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.819000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.820000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.820000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca031deb0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.820000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.820000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.820000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca031ded0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.820000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.823000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.823000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffca031dea0 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.823000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.824000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffca031df10 a2=28 a3=0 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.824000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca031dcc0 a2=50 a3=1 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.824000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.824000 audit: BPF prog-id=244 op=LOAD May 10 00:46:27.824000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffca031dcc0 a2=94 a3=5 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.824000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.826000 audit: BPF prog-id=244 op=UNLOAD May 10 00:46:27.826000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.826000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffca031dd70 a2=50 a3=1 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.826000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.826000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.826000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffca031de90 a2=4 a3=38 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.826000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { confidentiality } for pid=6099 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:27.827000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca031dee0 a2=94 a3=6 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { confidentiality } for pid=6099 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:27.827000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca031d690 a2=94 a3=83 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { perfmon } for pid=6099 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { bpf } for pid=6099 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.827000 audit[6099]: AVC avc: denied { confidentiality } for pid=6099 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:27.827000 audit[6099]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffca031d690 a2=94 a3=83 items=0 ppid=6006 pid=6099 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.827000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit: BPF prog-id=245 op=LOAD May 10 00:46:27.840000 audit[6160]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbabfea40 a2=98 a3=1999999999999999 items=0 ppid=6006 pid=6160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.840000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:27.840000 audit: BPF prog-id=245 op=UNLOAD May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit: BPF prog-id=246 op=LOAD May 10 00:46:27.840000 audit[6160]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbabfe920 a2=74 a3=ffff items=0 ppid=6006 pid=6160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.840000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:27.840000 audit: BPF prog-id=246 op=UNLOAD May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { perfmon } for pid=6160 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit[6160]: AVC avc: denied { bpf } for pid=6160 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.840000 audit: BPF prog-id=247 op=LOAD May 10 00:46:27.840000 audit[6160]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdbabfe960 a2=40 a3=7ffdbabfeb40 items=0 ppid=6006 pid=6160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.840000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 00:46:27.840000 audit: BPF prog-id=247 op=UNLOAD May 10 00:46:27.971000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.971000 audit: BPF prog-id=248 op=LOAD May 10 00:46:27.971000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffab56a9e0 a2=98 a3=ffffffff items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.971000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.982000 audit: BPF prog-id=248 op=UNLOAD May 10 00:46:27.982000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.982000 audit: BPF prog-id=249 op=LOAD May 10 00:46:27.982000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffab56a7f0 a2=74 a3=540051 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.982000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.983000 audit: BPF prog-id=249 op=UNLOAD May 10 00:46:27.983000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit: BPF prog-id=250 op=LOAD May 10 00:46:27.983000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffab56a820 a2=94 a3=2 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.983000 audit: BPF prog-id=250 op=UNLOAD May 10 00:46:27.983000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffab56a6f0 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.983000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.983000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffab56a720 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.983000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffab56a630 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffab56a740 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffab56a720 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffab56a710 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffab56a740 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffab56a720 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffab56a740 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffab56a710 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffab56a780 a2=28 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.986000 audit: BPF prog-id=251 op=LOAD May 10 00:46:27.986000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffab56a5f0 a2=40 a3=0 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.986000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.986000 audit: BPF prog-id=251 op=UNLOAD May 10 00:46:27.988000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.988000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffab56a5e0 a2=50 a3=2800 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.988000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.988000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.988000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffab56a5e0 a2=50 a3=2800 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.988000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit: BPF prog-id=252 op=LOAD May 10 00:46:27.989000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffab569e00 a2=94 a3=2 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:27.989000 audit: BPF prog-id=252 op=UNLOAD May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { perfmon } for pid=6189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit[6189]: AVC avc: denied { bpf } for pid=6189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:27.989000 audit: BPF prog-id=253 op=LOAD May 10 00:46:27.989000 audit[6189]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffab569f00 a2=94 a3=30 items=0 ppid=6006 pid=6189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:27.989000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit: BPF prog-id=254 op=LOAD May 10 00:46:28.008000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd6422230 a2=98 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.008000 audit: BPF prog-id=254 op=UNLOAD May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit: BPF prog-id=255 op=LOAD May 10 00:46:28.008000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6422010 a2=74 a3=540051 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.008000 audit: BPF prog-id=255 op=UNLOAD May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.008000 audit: BPF prog-id=256 op=LOAD May 10 00:46:28.008000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6422040 a2=94 a3=2 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.008000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.008000 audit: BPF prog-id=256 op=UNLOAD May 10 00:46:28.119929 sshd[6100]: pam_unix(sshd:session): session closed for user core May 10 00:46:28.120000 audit[6100]: USER_END pid=6100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:28.120000 audit[6100]: CRED_DISP pid=6100 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:28.125188 systemd-logind[1227]: Session 15 logged out. Waiting for processes to exit. May 10 00:46:28.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.128.0.17:22-147.75.109.163:59808 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:28.126915 systemd[1]: sshd@15-10.128.0.17:22-147.75.109.163:59808.service: Deactivated successfully. May 10 00:46:28.128115 systemd[1]: session-15.scope: Deactivated successfully. May 10 00:46:28.130914 systemd-logind[1227]: Removed session 15. May 10 00:46:28.255000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit: BPF prog-id=257 op=LOAD May 10 00:46:28.255000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fffd6421f00 a2=40 a3=1 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.255000 audit: BPF prog-id=257 op=UNLOAD May 10 00:46:28.255000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.255000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fffd6421fd0 a2=50 a3=7fffd64220b0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.255000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.270000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.270000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6421f10 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.270000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.270000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6421f40 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.270000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6421e50 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6421f60 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6421f40 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6421f30 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6421f60 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6421f40 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6421f60 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd6421f30 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fffd6421fa0 a2=28 a3=0 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd6421d50 a2=50 a3=1 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit: BPF prog-id=258 op=LOAD May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd6421d50 a2=94 a3=5 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit: BPF prog-id=258 op=UNLOAD May 10 00:46:28.271000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fffd6421e00 a2=50 a3=1 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fffd6421f20 a2=4 a3=38 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.271000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6421f70 a2=94 a3=6 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.271000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.272000 audit[6193]: AVC avc: denied { confidentiality } for pid=6193 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:28.272000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6421720 a2=94 a3=83 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.272000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { perfmon } for pid=6193 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { confidentiality } for pid=6193 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 00:46:28.273000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fffd6421720 a2=94 a3=83 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.273000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.273000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6423160 a2=10 a3=f1f00800 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.273000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.274000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.274000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6423000 a2=10 a3=3 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.274000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.274000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.274000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6422fa0 a2=10 a3=3 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.274000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.274000 audit[6193]: AVC avc: denied { bpf } for pid=6193 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 00:46:28.274000 audit[6193]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fffd6422fa0 a2=10 a3=7 items=0 ppid=6006 pid=6193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.274000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 00:46:28.285000 audit: BPF prog-id=253 op=UNLOAD May 10 00:46:28.383000 audit[6229]: NETFILTER_CFG table=filter:131 family=2 entries=70 op=nft_register_chain pid=6229 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:28.383000 audit[6229]: SYSCALL arch=c000003e syscall=46 success=yes exit=22312 a0=3 a1=7ffef32bd9b0 a2=0 a3=7ffef32bd99c items=0 ppid=6006 pid=6229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.383000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:28.383000 audit[6229]: NETFILTER_CFG table=filter:132 family=2 entries=4 op=nft_unregister_chain pid=6229 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 00:46:28.383000 audit[6229]: SYSCALL arch=c000003e syscall=46 success=yes exit=560 a0=3 a1=7ffef32bd9b0 a2=0 a3=558e90eae000 items=0 ppid=6006 pid=6229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:28.383000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 00:46:28.540586 systemd[1]: run-containerd-runc-k8s.io-fbef9bd29c68abe03d63947b73747ff3ef166b5c1287f5b51ec9381996d54418-runc.DUHgCu.mount: Deactivated successfully. May 10 00:46:29.501616 systemd[1]: run-containerd-runc-k8s.io-fbef9bd29c68abe03d63947b73747ff3ef166b5c1287f5b51ec9381996d54418-runc.upvYRq.mount: Deactivated successfully. May 10 00:46:33.167000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.17:22-147.75.109.163:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:33.167565 systemd[1]: Started sshd@16-10.128.0.17:22-147.75.109.163:59820.service. May 10 00:46:33.174337 kernel: kauditd_printk_skb: 587 callbacks suppressed May 10 00:46:33.174488 kernel: audit: type=1130 audit(1746837993.167:1625): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.17:22-147.75.109.163:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:33.462000 audit[6293]: USER_ACCT pid=6293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.464518 sshd[6293]: Accepted publickey for core from 147.75.109.163 port 59820 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:33.493247 kernel: audit: type=1101 audit(1746837993.462:1626): pid=6293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.494743 sshd[6293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:33.492000 audit[6293]: CRED_ACQ pid=6293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.508761 systemd[1]: Started session-16.scope. May 10 00:46:33.510176 systemd-logind[1227]: New session 16 of user core. May 10 00:46:33.522392 kernel: audit: type=1103 audit(1746837993.492:1627): pid=6293 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.542263 kernel: audit: type=1006 audit(1746837993.492:1628): pid=6293 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 00:46:33.542447 kernel: audit: type=1300 audit(1746837993.492:1628): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed763b030 a2=3 a3=0 items=0 ppid=1 pid=6293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:33.492000 audit[6293]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed763b030 a2=3 a3=0 items=0 ppid=1 pid=6293 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:33.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:33.569266 kernel: audit: type=1327 audit(1746837993.492:1628): proctitle=737368643A20636F7265205B707269765D May 10 00:46:33.522000 audit[6293]: USER_START pid=6293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.610933 kernel: audit: type=1105 audit(1746837993.522:1629): pid=6293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.611325 kernel: audit: type=1103 audit(1746837993.525:1630): pid=6303 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.525000 audit[6303]: CRED_ACQ pid=6303 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.784901 sshd[6293]: pam_unix(sshd:session): session closed for user core May 10 00:46:33.786000 audit[6293]: USER_END pid=6293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.820276 kernel: audit: type=1106 audit(1746837993.786:1631): pid=6293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.823327 systemd[1]: sshd@16-10.128.0.17:22-147.75.109.163:59820.service: Deactivated successfully. May 10 00:46:33.824635 systemd[1]: session-16.scope: Deactivated successfully. May 10 00:46:33.786000 audit[6293]: CRED_DISP pid=6293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.830640 systemd-logind[1227]: Session 16 logged out. Waiting for processes to exit. May 10 00:46:33.832460 systemd-logind[1227]: Removed session 16. May 10 00:46:33.850418 kernel: audit: type=1104 audit(1746837993.786:1632): pid=6293 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:33.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.128.0.17:22-147.75.109.163:59820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:33.860859 systemd[1]: Started sshd@17-10.128.0.17:22-147.75.109.163:59834.service. May 10 00:46:33.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.17:22-147.75.109.163:59834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:34.154000 audit[6313]: USER_ACCT pid=6313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.156357 sshd[6313]: Accepted publickey for core from 147.75.109.163 port 59834 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:34.156000 audit[6313]: CRED_ACQ pid=6313 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.156000 audit[6313]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff414e0010 a2=3 a3=0 items=0 ppid=1 pid=6313 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:34.156000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:34.158508 sshd[6313]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:34.166197 systemd-logind[1227]: New session 17 of user core. May 10 00:46:34.167728 systemd[1]: Started session-17.scope. May 10 00:46:34.175000 audit[6313]: USER_START pid=6313 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.179000 audit[6315]: CRED_ACQ pid=6315 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.526461 sshd[6313]: pam_unix(sshd:session): session closed for user core May 10 00:46:34.527000 audit[6313]: USER_END pid=6313 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.527000 audit[6313]: CRED_DISP pid=6313 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.531178 systemd[1]: sshd@17-10.128.0.17:22-147.75.109.163:59834.service: Deactivated successfully. May 10 00:46:34.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.128.0.17:22-147.75.109.163:59834 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:34.532546 systemd[1]: session-17.scope: Deactivated successfully. May 10 00:46:34.533664 systemd-logind[1227]: Session 17 logged out. Waiting for processes to exit. May 10 00:46:34.535044 systemd-logind[1227]: Removed session 17. May 10 00:46:34.574179 systemd[1]: Started sshd@18-10.128.0.17:22-147.75.109.163:59836.service. May 10 00:46:34.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.17:22-147.75.109.163:59836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:34.861000 audit[6323]: USER_ACCT pid=6323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.864376 sshd[6323]: Accepted publickey for core from 147.75.109.163 port 59836 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:34.863000 audit[6323]: CRED_ACQ pid=6323 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.864000 audit[6323]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd57e49820 a2=3 a3=0 items=0 ppid=1 pid=6323 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:34.864000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:34.865862 sshd[6323]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:34.873388 systemd[1]: Started session-18.scope. May 10 00:46:34.874072 systemd-logind[1227]: New session 18 of user core. May 10 00:46:34.882000 audit[6323]: USER_START pid=6323 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:34.885000 audit[6325]: CRED_ACQ pid=6325 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:35.860000 audit[6335]: NETFILTER_CFG table=filter:133 family=2 entries=8 op=nft_register_rule pid=6335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:35.860000 audit[6335]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffda5968aa0 a2=0 a3=7ffda5968a8c items=0 ppid=2301 pid=6335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:35.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:35.868000 audit[6335]: NETFILTER_CFG table=nat:134 family=2 entries=36 op=nft_register_rule pid=6335 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:35.868000 audit[6335]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffda5968aa0 a2=0 a3=7ffda5968a8c items=0 ppid=2301 pid=6335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:35.868000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:37.101000 audit[6337]: NETFILTER_CFG table=filter:135 family=2 entries=20 op=nft_register_rule pid=6337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:37.101000 audit[6337]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff188c9cb0 a2=0 a3=7fff188c9c9c items=0 ppid=2301 pid=6337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.101000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:37.108000 audit[6337]: NETFILTER_CFG table=nat:136 family=2 entries=22 op=nft_register_rule pid=6337 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:37.108000 audit[6337]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff188c9cb0 a2=0 a3=0 items=0 ppid=2301 pid=6337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.108000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:37.145000 audit[6339]: NETFILTER_CFG table=filter:137 family=2 entries=32 op=nft_register_rule pid=6339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:37.145000 audit[6339]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffe071a200 a2=0 a3=7fffe071a1ec items=0 ppid=2301 pid=6339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.145000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:37.152000 audit[6339]: NETFILTER_CFG table=nat:138 family=2 entries=22 op=nft_register_rule pid=6339 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:37.152000 audit[6339]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffe071a200 a2=0 a3=0 items=0 ppid=2301 pid=6339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:37.153875 sshd[6323]: pam_unix(sshd:session): session closed for user core May 10 00:46:37.156000 audit[6323]: USER_END pid=6323 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:37.156000 audit[6323]: CRED_DISP pid=6323 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:37.160526 systemd-logind[1227]: Session 18 logged out. Waiting for processes to exit. May 10 00:46:37.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.128.0.17:22-147.75.109.163:59836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:37.161884 systemd[1]: sshd@18-10.128.0.17:22-147.75.109.163:59836.service: Deactivated successfully. May 10 00:46:37.163190 systemd[1]: session-18.scope: Deactivated successfully. May 10 00:46:37.166156 systemd-logind[1227]: Removed session 18. May 10 00:46:37.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.17:22-147.75.109.163:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:37.201036 systemd[1]: Started sshd@19-10.128.0.17:22-147.75.109.163:53724.service. May 10 00:46:37.492000 audit[6342]: USER_ACCT pid=6342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:37.493580 sshd[6342]: Accepted publickey for core from 147.75.109.163 port 53724 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:37.495000 audit[6342]: CRED_ACQ pid=6342 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:37.495000 audit[6342]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3cf781a0 a2=3 a3=0 items=0 ppid=1 pid=6342 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:37.495000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:37.497049 sshd[6342]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:37.510307 systemd[1]: Started session-19.scope. May 10 00:46:37.511361 systemd-logind[1227]: New session 19 of user core. May 10 00:46:37.523000 audit[6342]: USER_START pid=6342 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:37.526000 audit[6344]: CRED_ACQ pid=6344 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.004596 sshd[6342]: pam_unix(sshd:session): session closed for user core May 10 00:46:38.006000 audit[6342]: USER_END pid=6342 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.006000 audit[6342]: CRED_DISP pid=6342 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.009257 systemd[1]: sshd@19-10.128.0.17:22-147.75.109.163:53724.service: Deactivated successfully. May 10 00:46:38.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.128.0.17:22-147.75.109.163:53724 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:38.010623 systemd[1]: session-19.scope: Deactivated successfully. May 10 00:46:38.011785 systemd-logind[1227]: Session 19 logged out. Waiting for processes to exit. May 10 00:46:38.013244 systemd-logind[1227]: Removed session 19. May 10 00:46:38.053012 systemd[1]: Started sshd@20-10.128.0.17:22-147.75.109.163:53736.service. May 10 00:46:38.053000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.17:22-147.75.109.163:53736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:38.344000 audit[6352]: USER_ACCT pid=6352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.346156 sshd[6352]: Accepted publickey for core from 147.75.109.163 port 53736 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:38.350672 kernel: kauditd_printk_skb: 53 callbacks suppressed May 10 00:46:38.350783 kernel: audit: type=1101 audit(1746837998.344:1668): pid=6352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.351884 sshd[6352]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:38.361986 systemd[1]: Started session-20.scope. May 10 00:46:38.365687 systemd-logind[1227]: New session 20 of user core. May 10 00:46:38.350000 audit[6352]: CRED_ACQ pid=6352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.408352 kernel: audit: type=1103 audit(1746837998.350:1669): pid=6352 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.350000 audit[6352]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7e8ec170 a2=3 a3=0 items=0 ppid=1 pid=6352 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.456518 kernel: audit: type=1006 audit(1746837998.350:1670): pid=6352 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 10 00:46:38.456663 kernel: audit: type=1300 audit(1746837998.350:1670): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7e8ec170 a2=3 a3=0 items=0 ppid=1 pid=6352 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:38.350000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:38.466473 kernel: audit: type=1327 audit(1746837998.350:1670): proctitle=737368643A20636F7265205B707269765D May 10 00:46:38.382000 audit[6352]: USER_START pid=6352 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.499288 kernel: audit: type=1105 audit(1746837998.382:1671): pid=6352 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.410000 audit[6355]: CRED_ACQ pid=6355 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.500320 kernel: audit: type=1103 audit(1746837998.410:1672): pid=6355 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.665710 sshd[6352]: pam_unix(sshd:session): session closed for user core May 10 00:46:38.668000 audit[6352]: USER_END pid=6352 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.673090 systemd[1]: sshd@20-10.128.0.17:22-147.75.109.163:53736.service: Deactivated successfully. May 10 00:46:38.674368 systemd[1]: session-20.scope: Deactivated successfully. May 10 00:46:38.676777 systemd-logind[1227]: Session 20 logged out. Waiting for processes to exit. May 10 00:46:38.679307 systemd-logind[1227]: Removed session 20. May 10 00:46:38.668000 audit[6352]: CRED_DISP pid=6352 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.726068 kernel: audit: type=1106 audit(1746837998.668:1673): pid=6352 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.726310 kernel: audit: type=1104 audit(1746837998.668:1674): pid=6352 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:38.726387 kernel: audit: type=1131 audit(1746837998.668:1675): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.17:22-147.75.109.163:53736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:38.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.128.0.17:22-147.75.109.163:53736 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:43.715621 systemd[1]: Started sshd@21-10.128.0.17:22-147.75.109.163:53742.service. May 10 00:46:43.714000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.17:22-147.75.109.163:53742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:43.741253 kernel: audit: type=1130 audit(1746838003.714:1676): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.17:22-147.75.109.163:53742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:43.890000 audit[6377]: NETFILTER_CFG table=filter:139 family=2 entries=20 op=nft_register_rule pid=6377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:43.908261 kernel: audit: type=1325 audit(1746838003.890:1677): table=filter:139 family=2 entries=20 op=nft_register_rule pid=6377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:43.890000 audit[6377]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed943aad0 a2=0 a3=7ffed943aabc items=0 ppid=2301 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.942250 kernel: audit: type=1300 audit(1746838003.890:1677): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffed943aad0 a2=0 a3=7ffed943aabc items=0 ppid=2301 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:43.890000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:43.961268 kernel: audit: type=1327 audit(1746838003.890:1677): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:43.960000 audit[6377]: NETFILTER_CFG table=nat:140 family=2 entries=106 op=nft_register_chain pid=6377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:43.960000 audit[6377]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffed943aad0 a2=0 a3=7ffed943aabc items=0 ppid=2301 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:44.012400 kernel: audit: type=1325 audit(1746838003.960:1678): table=nat:140 family=2 entries=106 op=nft_register_chain pid=6377 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 00:46:44.012609 kernel: audit: type=1300 audit(1746838003.960:1678): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffed943aad0 a2=0 a3=7ffed943aabc items=0 ppid=2301 pid=6377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:44.012656 kernel: audit: type=1327 audit(1746838003.960:1678): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:43.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 00:46:44.031020 sshd[6374]: Accepted publickey for core from 147.75.109.163 port 53742 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:44.029000 audit[6374]: USER_ACCT pid=6374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:44.061285 kernel: audit: type=1101 audit(1746838004.029:1679): pid=6374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:44.060000 audit[6374]: CRED_ACQ pid=6374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:44.062584 sshd[6374]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:44.072380 systemd[1]: Started session-21.scope. May 10 00:46:44.073874 systemd-logind[1227]: New session 21 of user core. May 10 00:46:44.088318 kernel: audit: type=1103 audit(1746838004.060:1680): pid=6374 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:44.060000 audit[6374]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeb60db490 a2=3 a3=0 items=0 ppid=1 pid=6374 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:44.060000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:44.084000 audit[6374]: USER_START pid=6374 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:44.089000 audit[6379]: CRED_ACQ pid=6379 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:44.106458 kernel: audit: type=1006 audit(1746838004.060:1681): pid=6374 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 10 00:46:44.350828 sshd[6374]: pam_unix(sshd:session): session closed for user core May 10 00:46:44.353000 audit[6374]: USER_END pid=6374 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:44.353000 audit[6374]: CRED_DISP pid=6374 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:44.358264 systemd[1]: sshd@21-10.128.0.17:22-147.75.109.163:53742.service: Deactivated successfully. May 10 00:46:44.359532 systemd[1]: session-21.scope: Deactivated successfully. May 10 00:46:44.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.128.0.17:22-147.75.109.163:53742 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:44.359774 systemd-logind[1227]: Session 21 logged out. Waiting for processes to exit. May 10 00:46:44.361669 systemd-logind[1227]: Removed session 21. May 10 00:46:49.396394 systemd[1]: Started sshd@22-10.128.0.17:22-147.75.109.163:48790.service. May 10 00:46:49.427173 kernel: kauditd_printk_skb: 7 callbacks suppressed May 10 00:46:49.427380 kernel: audit: type=1130 audit(1746838009.395:1687): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.17:22-147.75.109.163:48790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:49.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.17:22-147.75.109.163:48790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:49.687000 audit[6400]: USER_ACCT pid=6400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:49.688739 sshd[6400]: Accepted publickey for core from 147.75.109.163 port 48790 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:49.718439 kernel: audit: type=1101 audit(1746838009.687:1688): pid=6400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:49.717000 audit[6400]: CRED_ACQ pid=6400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:49.720012 sshd[6400]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:49.734010 systemd[1]: Started session-22.scope. May 10 00:46:49.736574 systemd-logind[1227]: New session 22 of user core. May 10 00:46:49.745535 kernel: audit: type=1103 audit(1746838009.717:1689): pid=6400 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:49.765069 kernel: audit: type=1006 audit(1746838009.718:1690): pid=6400 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 10 00:46:49.718000 audit[6400]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdaa45ce0 a2=3 a3=0 items=0 ppid=1 pid=6400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:49.718000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:49.805134 kernel: audit: type=1300 audit(1746838009.718:1690): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcdaa45ce0 a2=3 a3=0 items=0 ppid=1 pid=6400 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:49.805357 kernel: audit: type=1327 audit(1746838009.718:1690): proctitle=737368643A20636F7265205B707269765D May 10 00:46:49.745000 audit[6400]: USER_START pid=6400 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:49.838416 kernel: audit: type=1105 audit(1746838009.745:1691): pid=6400 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:49.838595 kernel: audit: type=1103 audit(1746838009.751:1692): pid=6402 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:49.751000 audit[6402]: CRED_ACQ pid=6402 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:49.999094 sshd[6400]: pam_unix(sshd:session): session closed for user core May 10 00:46:50.000000 audit[6400]: USER_END pid=6400 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:50.034244 kernel: audit: type=1106 audit(1746838010.000:1693): pid=6400 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:50.002000 audit[6400]: CRED_DISP pid=6400 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:50.035982 systemd[1]: sshd@22-10.128.0.17:22-147.75.109.163:48790.service: Deactivated successfully. May 10 00:46:50.037262 systemd[1]: session-22.scope: Deactivated successfully. May 10 00:46:50.039672 systemd-logind[1227]: Session 22 logged out. Waiting for processes to exit. May 10 00:46:50.041516 systemd-logind[1227]: Removed session 22. May 10 00:46:50.035000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.128.0.17:22-147.75.109.163:48790 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:50.059426 kernel: audit: type=1104 audit(1746838010.002:1694): pid=6400 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:53.040078 systemd[1]: run-containerd-runc-k8s.io-fed1ee6ccb2ca92a165d8c84fb7d248f89ba68d037ad2b61c2f9fd9f5e0d761f-runc.HvNprV.mount: Deactivated successfully. May 10 00:46:55.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.17:22-147.75.109.163:48798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:55.047835 systemd[1]: Started sshd@23-10.128.0.17:22-147.75.109.163:48798.service. May 10 00:46:55.054382 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 00:46:55.054517 kernel: audit: type=1130 audit(1746838015.048:1696): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.17:22-147.75.109.163:48798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:55.355000 audit[6434]: USER_ACCT pid=6434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:55.358239 sshd[6434]: Accepted publickey for core from 147.75.109.163 port 48798 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:46:55.386262 kernel: audit: type=1101 audit(1746838015.355:1697): pid=6434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:55.388266 sshd[6434]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:46:55.387000 audit[6434]: CRED_ACQ pid=6434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:55.399098 systemd[1]: Started session-23.scope. May 10 00:46:55.401188 systemd-logind[1227]: New session 23 of user core. May 10 00:46:55.415376 kernel: audit: type=1103 audit(1746838015.387:1698): pid=6434 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:55.440293 kernel: audit: type=1006 audit(1746838015.387:1699): pid=6434 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 00:46:55.440440 kernel: audit: type=1300 audit(1746838015.387:1699): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7b10660 a2=3 a3=0 items=0 ppid=1 pid=6434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.387000 audit[6434]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7b10660 a2=3 a3=0 items=0 ppid=1 pid=6434 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:46:55.387000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:46:55.476625 kernel: audit: type=1327 audit(1746838015.387:1699): proctitle=737368643A20636F7265205B707269765D May 10 00:46:55.476809 kernel: audit: type=1400 audit(1746838015.395:1700): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.395000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8255 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.395000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0193fb4d0 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:46:55.536641 kernel: audit: type=1300 audit(1746838015.395:1700): arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0193fb4d0 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:46:55.536805 kernel: audit: type=1327 audit(1746838015.395:1700): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:55.395000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:55.396000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.592241 kernel: audit: type=1400 audit(1746838015.396:1701): avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.396000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0193fb500 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:46:55.396000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:55.415000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.415000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0112f6600 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:46:55.415000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:55.415000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.415000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c019554a80 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:46:55.415000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:55.415000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.415000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0112f6620 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:46:55.415000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:55.418000 audit[6434]: USER_START pid=6434 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:55.423000 audit[6436]: CRED_ACQ pid=6436 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:55.432000 audit[1996]: AVC avc: denied { watch } for pid=1996 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=8271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.432000 audit[1996]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c0193fbbf0 a2=fc6 a3=0 items=0 ppid=1847 pid=1996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c614,c806 key=(null) May 10 00:46:55.432000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3132382E302E3137002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 May 10 00:46:55.697278 sshd[6434]: pam_unix(sshd:session): session closed for user core May 10 00:46:55.699000 audit[6434]: USER_END pid=6434 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:55.699000 audit[6434]: CRED_DISP pid=6434 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:46:55.703000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.128.0.17:22-147.75.109.163:48798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:46:55.703026 systemd[1]: sshd@23-10.128.0.17:22-147.75.109.163:48798.service: Deactivated successfully. May 10 00:46:55.704365 systemd[1]: session-23.scope: Deactivated successfully. May 10 00:46:55.705536 systemd-logind[1227]: Session 23 logged out. Waiting for processes to exit. May 10 00:46:55.708421 systemd-logind[1227]: Removed session 23. May 10 00:46:55.735000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.735000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003785c20 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:46:55.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:55.736000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=8269 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:55.736000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002dcf890 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:46:55.736000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:56.124269 systemd[1]: run-containerd-runc-k8s.io-fbef9bd29c68abe03d63947b73747ff3ef166b5c1287f5b51ec9381996d54418-runc.4ti1Rj.mount: Deactivated successfully. May 10 00:46:59.937000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:59.937000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:59.937000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00320e860 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:46:59.937000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:59.937000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001f2b980 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:46:59.937000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:59.938000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:59.938000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001ac0100 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:46:59.938000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:46:59.939000 audit[1978]: AVC avc: denied { watch } for pid=1978 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8253 scontext=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 00:46:59.939000 audit[1978]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001ac0120 a2=fc6 a3=0 items=0 ppid=1827 pid=1978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c173,c897 key=(null) May 10 00:46:59.939000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 00:47:00.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.17:22-147.75.109.163:37524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:00.745347 systemd[1]: Started sshd@24-10.128.0.17:22-147.75.109.163:37524.service. May 10 00:47:00.754209 kernel: kauditd_printk_skb: 37 callbacks suppressed May 10 00:47:00.754467 kernel: audit: type=1130 audit(1746838020.744:1717): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.17:22-147.75.109.163:37524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:00.784000 audit[4673]: AVC avc: denied { watch } for pid=4673 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_33.3513965873/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c508 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c422,c508 tclass=file permissive=0 May 10 00:47:00.784000 audit[4673]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00186e6a0 a2=fc6 a3=0 items=0 ppid=4322 pid=4673 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c508 key=(null) May 10 00:47:00.851921 kernel: audit: type=1400 audit(1746838020.784:1718): avc: denied { watch } for pid=4673 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_33.3513965873/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c422,c508 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c422,c508 tclass=file permissive=0 May 10 00:47:00.852109 kernel: audit: type=1300 audit(1746838020.784:1718): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00186e6a0 a2=fc6 a3=0 items=0 ppid=4322 pid=4673 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c422,c508 key=(null) May 10 00:47:00.784000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:00.884266 kernel: audit: type=1327 audit(1746838020.784:1718): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:00.904000 audit[4707]: AVC avc: denied { watch } for pid=4707 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_33.472549325/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c987 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c987 tclass=file permissive=0 May 10 00:47:00.904000 audit[4707]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b3bd40 a2=fc6 a3=0 items=0 ppid=4366 pid=4707 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c987 key=(null) May 10 00:47:00.971374 kernel: audit: type=1400 audit(1746838020.904:1719): avc: denied { watch } for pid=4707 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_00_45_33.472549325/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c900,c987 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c900,c987 tclass=file permissive=0 May 10 00:47:00.971572 kernel: audit: type=1300 audit(1746838020.904:1719): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b3bd40 a2=fc6 a3=0 items=0 ppid=4366 pid=4707 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c900,c987 key=(null) May 10 00:47:00.904000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:01.004298 kernel: audit: type=1327 audit(1746838020.904:1719): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 00:47:01.102000 audit[6467]: USER_ACCT pid=6467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:47:01.104689 sshd[6467]: Accepted publickey for core from 147.75.109.163 port 37524 ssh2: RSA SHA256:euqJNJC5P+Wq5j+dl78lhvyXKvYvUXQDTjxbGHC2Bdk May 10 00:47:01.133349 kernel: audit: type=1101 audit(1746838021.102:1720): pid=6467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_oslogin_admin,pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:47:01.132000 audit[6467]: CRED_ACQ pid=6467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:47:01.135301 sshd[6467]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 00:47:01.161359 kernel: audit: type=1103 audit(1746838021.132:1721): pid=6467 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:47:01.179386 kernel: audit: type=1006 audit(1746838021.132:1722): pid=6467 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 10 00:47:01.132000 audit[6467]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca93d8950 a2=3 a3=0 items=0 ppid=1 pid=6467 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 00:47:01.132000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 00:47:01.180908 systemd-logind[1227]: New session 24 of user core. May 10 00:47:01.181896 systemd[1]: Started session-24.scope. May 10 00:47:01.194000 audit[6467]: USER_START pid=6467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:47:01.197000 audit[6469]: CRED_ACQ pid=6469 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:47:01.214358 kubelet[2110]: I0510 00:47:01.214289 2110 scope.go:117] "RemoveContainer" containerID="ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153" May 10 00:47:01.216709 env[1215]: time="2025-05-10T00:47:01.216640189Z" level=info msg="RemoveContainer for \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\"" May 10 00:47:01.223456 env[1215]: time="2025-05-10T00:47:01.222941710Z" level=info msg="RemoveContainer for \"ac64848f50ef7f95260628e54794fbaab078dd909f941a3510eec62cc8377153\" returns successfully" May 10 00:47:01.227593 env[1215]: time="2025-05-10T00:47:01.227540025Z" level=info msg="StopPodSandbox for \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\"" May 10 00:47:01.228010 env[1215]: time="2025-05-10T00:47:01.227940108Z" level=info msg="TearDown network for sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" successfully" May 10 00:47:01.228243 env[1215]: time="2025-05-10T00:47:01.228182625Z" level=info msg="StopPodSandbox for \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" returns successfully" May 10 00:47:01.228804 env[1215]: time="2025-05-10T00:47:01.228769229Z" level=info msg="RemovePodSandbox for \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\"" May 10 00:47:01.228999 env[1215]: time="2025-05-10T00:47:01.228945128Z" level=info msg="Forcibly stopping sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\"" May 10 00:47:01.229208 env[1215]: time="2025-05-10T00:47:01.229169596Z" level=info msg="TearDown network for sandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" successfully" May 10 00:47:01.237660 env[1215]: time="2025-05-10T00:47:01.237595383Z" level=info msg="RemovePodSandbox \"c164e402b257e8cfbe32dd46c7b3a779f1f9c061c8bafa0acb8168d6daa5f5d3\" returns successfully" May 10 00:47:01.238662 env[1215]: time="2025-05-10T00:47:01.238618442Z" level=info msg="StopPodSandbox for \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\"" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.305 [WARNING][6485] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.305 [INFO][6485] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.305 [INFO][6485] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" iface="eth0" netns="" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.305 [INFO][6485] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.305 [INFO][6485] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.355 [INFO][6492] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.355 [INFO][6492] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.355 [INFO][6492] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.366 [WARNING][6492] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.366 [INFO][6492] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.368 [INFO][6492] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:01.373032 env[1215]: 2025-05-10 00:47:01.370 [INFO][6485] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:47:01.373032 env[1215]: time="2025-05-10T00:47:01.371892696Z" level=info msg="TearDown network for sandbox \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\" successfully" May 10 00:47:01.373032 env[1215]: time="2025-05-10T00:47:01.371939488Z" level=info msg="StopPodSandbox for \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\" returns successfully" May 10 00:47:01.373032 env[1215]: time="2025-05-10T00:47:01.372683209Z" level=info msg="RemovePodSandbox for \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\"" May 10 00:47:01.373032 env[1215]: time="2025-05-10T00:47:01.372724182Z" level=info msg="Forcibly stopping sandbox \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\"" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.473 [WARNING][6519] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.473 [INFO][6519] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.473 [INFO][6519] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" iface="eth0" netns="" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.473 [INFO][6519] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.473 [INFO][6519] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.509 [INFO][6526] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.510 [INFO][6526] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.511 [INFO][6526] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.518 [WARNING][6526] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.518 [INFO][6526] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" HandleID="k8s-pod-network.e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--apiserver--8656cd8877--b6k55-eth0" May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.520 [INFO][6526] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:01.522867 env[1215]: 2025-05-10 00:47:01.521 [INFO][6519] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6" May 10 00:47:01.524003 env[1215]: time="2025-05-10T00:47:01.522912831Z" level=info msg="TearDown network for sandbox \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\" successfully" May 10 00:47:01.528000 audit[6467]: USER_END pid=6467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_mkhomedir,pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:47:01.529000 audit[6467]: CRED_DISP pid=6467 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_oslogin_login acct="core" exe="/usr/sbin/sshd" hostname=147.75.109.163 addr=147.75.109.163 terminal=ssh res=success' May 10 00:47:01.528328 sshd[6467]: pam_unix(sshd:session): session closed for user core May 10 00:47:01.532703 env[1215]: time="2025-05-10T00:47:01.532643428Z" level=info msg="RemovePodSandbox \"e934b420a7ec3d6e3e14a2873d2b3546a055c8a26fd79da4c9df4779d76ddff6\" returns successfully" May 10 00:47:01.533034 systemd[1]: sshd@24-10.128.0.17:22-147.75.109.163:37524.service: Deactivated successfully. May 10 00:47:01.534128 env[1215]: time="2025-05-10T00:47:01.534088562Z" level=info msg="StopPodSandbox for \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\"" May 10 00:47:01.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.128.0.17:22-147.75.109.163:37524 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 00:47:01.534492 systemd[1]: session-24.scope: Deactivated successfully. May 10 00:47:01.536712 systemd-logind[1227]: Session 24 logged out. Waiting for processes to exit. May 10 00:47:01.539153 systemd-logind[1227]: Removed session 24. May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.598 [WARNING][6547] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.598 [INFO][6547] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.598 [INFO][6547] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" iface="eth0" netns="" May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.598 [INFO][6547] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.598 [INFO][6547] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.632 [INFO][6554] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.633 [INFO][6554] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.633 [INFO][6554] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.644 [WARNING][6554] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.644 [INFO][6554] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.647 [INFO][6554] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:01.652201 env[1215]: 2025-05-10 00:47:01.648 [INFO][6547] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:47:01.654284 env[1215]: time="2025-05-10T00:47:01.654193125Z" level=info msg="TearDown network for sandbox \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\" successfully" May 10 00:47:01.654745 env[1215]: time="2025-05-10T00:47:01.654659091Z" level=info msg="StopPodSandbox for \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\" returns successfully" May 10 00:47:01.658078 env[1215]: time="2025-05-10T00:47:01.658036714Z" level=info msg="RemovePodSandbox for \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\"" May 10 00:47:01.658331 env[1215]: time="2025-05-10T00:47:01.658265508Z" level=info msg="Forcibly stopping sandbox \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\"" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.708 [WARNING][6575] cni-plugin/k8s.go 566: WorkloadEndpoint does not exist in the datastore, moving forward with the clean up ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" WorkloadEndpoint="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.708 [INFO][6575] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.708 [INFO][6575] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" iface="eth0" netns="" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.708 [INFO][6575] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.708 [INFO][6575] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.747 [INFO][6583] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.748 [INFO][6583] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.748 [INFO][6583] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.756 [WARNING][6583] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.757 [INFO][6583] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" HandleID="k8s-pod-network.4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" Workload="ci--3510--3--7--nightly--20250509--2100--6cf0867f062f8fb5b1cb-k8s-calico--kube--controllers--c5cc4b9d7--h77nx-eth0" May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.759 [INFO][6583] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 00:47:01.768067 env[1215]: 2025-05-10 00:47:01.766 [INFO][6575] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622" May 10 00:47:01.769040 env[1215]: time="2025-05-10T00:47:01.768141337Z" level=info msg="TearDown network for sandbox \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\" successfully" May 10 00:47:01.774087 env[1215]: time="2025-05-10T00:47:01.774025565Z" level=info msg="RemovePodSandbox \"4166eae2dbfa934024c98c0192daf0b4859674842b42975277c1dc35b6301622\" returns successfully" May 10 00:47:01.774873 env[1215]: time="2025-05-10T00:47:01.774825391Z" level=info msg="StopPodSandbox for \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\"" May 10 00:47:01.775029 env[1215]: time="2025-05-10T00:47:01.774963693Z" level=info msg="TearDown network for sandbox \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\" successfully" May 10 00:47:01.775119 env[1215]: time="2025-05-10T00:47:01.775031807Z" level=info msg="StopPodSandbox for \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\" returns successfully" May 10 00:47:01.775666 env[1215]: time="2025-05-10T00:47:01.775626367Z" level=info msg="RemovePodSandbox for \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\"" May 10 00:47:01.775789 env[1215]: time="2025-05-10T00:47:01.775671847Z" level=info msg="Forcibly stopping sandbox \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\"" May 10 00:47:01.775789 env[1215]: time="2025-05-10T00:47:01.775778192Z" level=info msg="TearDown network for sandbox \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\" successfully" May 10 00:47:01.781382 env[1215]: time="2025-05-10T00:47:01.781325723Z" level=info msg="RemovePodSandbox \"94a8c5403f107895c789743a27e8a66a6b931631e68d2d47716b49b0fc288792\" returns successfully"