May 10 03:33:28.786509 kernel: Linux version 5.15.181-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri May 9 23:12:23 -00 2025 May 10 03:33:28.786530 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 03:33:28.786540 kernel: BIOS-provided physical RAM map: May 10 03:33:28.786549 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 10 03:33:28.786556 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 10 03:33:28.786562 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 10 03:33:28.786570 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000bffdcfff] usable May 10 03:33:28.786577 kernel: BIOS-e820: [mem 0x00000000bffdd000-0x00000000bfffffff] reserved May 10 03:33:28.786584 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 10 03:33:28.786590 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 10 03:33:28.786597 kernel: BIOS-e820: [mem 0x0000000100000000-0x000000013fffffff] usable May 10 03:33:28.786603 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 10 03:33:28.786612 kernel: NX (Execute Disable) protection: active May 10 03:33:28.786618 kernel: SMBIOS 3.0.0 present. May 10 03:33:28.786626 kernel: DMI: OpenStack Foundation OpenStack Nova, BIOS 1.16.3-debian-1.16.3-2 04/01/2014 May 10 03:33:28.786633 kernel: Hypervisor detected: KVM May 10 03:33:28.786640 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 10 03:33:28.786647 kernel: kvm-clock: cpu 0, msr 95196001, primary cpu clock May 10 03:33:28.786657 kernel: kvm-clock: using sched offset of 3905426314 cycles May 10 03:33:28.786664 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 10 03:33:28.786672 kernel: tsc: Detected 1996.249 MHz processor May 10 03:33:28.786679 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 10 03:33:28.786687 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 10 03:33:28.786695 kernel: last_pfn = 0x140000 max_arch_pfn = 0x400000000 May 10 03:33:28.786702 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 10 03:33:28.786710 kernel: last_pfn = 0xbffdd max_arch_pfn = 0x400000000 May 10 03:33:28.786717 kernel: ACPI: Early table checksum verification disabled May 10 03:33:28.786726 kernel: ACPI: RSDP 0x00000000000F51E0 000014 (v00 BOCHS ) May 10 03:33:28.786733 kernel: ACPI: RSDT 0x00000000BFFE1B65 000030 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 03:33:28.786741 kernel: ACPI: FACP 0x00000000BFFE1A49 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 03:33:28.786748 kernel: ACPI: DSDT 0x00000000BFFE0040 001A09 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 03:33:28.786755 kernel: ACPI: FACS 0x00000000BFFE0000 000040 May 10 03:33:28.786762 kernel: ACPI: APIC 0x00000000BFFE1ABD 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 10 03:33:28.786770 kernel: ACPI: WAET 0x00000000BFFE1B3D 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 10 03:33:28.786777 kernel: ACPI: Reserving FACP table memory at [mem 0xbffe1a49-0xbffe1abc] May 10 03:33:28.786786 kernel: ACPI: Reserving DSDT table memory at [mem 0xbffe0040-0xbffe1a48] May 10 03:33:28.786793 kernel: ACPI: Reserving FACS table memory at [mem 0xbffe0000-0xbffe003f] May 10 03:33:28.786801 kernel: ACPI: Reserving APIC table memory at [mem 0xbffe1abd-0xbffe1b3c] May 10 03:33:28.786808 kernel: ACPI: Reserving WAET table memory at [mem 0xbffe1b3d-0xbffe1b64] May 10 03:33:28.786815 kernel: No NUMA configuration found May 10 03:33:28.786825 kernel: Faking a node at [mem 0x0000000000000000-0x000000013fffffff] May 10 03:33:28.786833 kernel: NODE_DATA(0) allocated [mem 0x13fff7000-0x13fffcfff] May 10 03:33:28.786842 kernel: Zone ranges: May 10 03:33:28.786849 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 10 03:33:28.786857 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] May 10 03:33:28.786864 kernel: Normal [mem 0x0000000100000000-0x000000013fffffff] May 10 03:33:28.786872 kernel: Movable zone start for each node May 10 03:33:28.786879 kernel: Early memory node ranges May 10 03:33:28.786887 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 10 03:33:28.786894 kernel: node 0: [mem 0x0000000000100000-0x00000000bffdcfff] May 10 03:33:28.786904 kernel: node 0: [mem 0x0000000100000000-0x000000013fffffff] May 10 03:33:28.786911 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000013fffffff] May 10 03:33:28.786919 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 10 03:33:28.786926 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 10 03:33:28.786934 kernel: On node 0, zone Normal: 35 pages in unavailable ranges May 10 03:33:28.786941 kernel: ACPI: PM-Timer IO Port: 0x608 May 10 03:33:28.786949 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 10 03:33:28.786957 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 10 03:33:28.786964 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 10 03:33:28.786974 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 10 03:33:28.786981 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 10 03:33:28.786989 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 10 03:33:28.786997 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 10 03:33:28.787004 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 10 03:33:28.787012 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs May 10 03:33:28.787019 kernel: [mem 0xc0000000-0xfeffbfff] available for PCI devices May 10 03:33:28.787027 kernel: Booting paravirtualized kernel on KVM May 10 03:33:28.787035 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 10 03:33:28.787044 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 May 10 03:33:28.787052 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 May 10 03:33:28.787059 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 May 10 03:33:28.787067 kernel: pcpu-alloc: [0] 0 1 May 10 03:33:28.787074 kernel: kvm-guest: stealtime: cpu 0, msr 13bc1c0c0 May 10 03:33:28.787082 kernel: kvm-guest: PV spinlocks disabled, no host support May 10 03:33:28.787089 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1031901 May 10 03:33:28.789132 kernel: Policy zone: Normal May 10 03:33:28.789149 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 03:33:28.789161 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 10 03:33:28.789169 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 10 03:33:28.789177 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 10 03:33:28.789185 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 10 03:33:28.789193 kernel: Memory: 3968276K/4193772K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47456K init, 4124K bss, 225236K reserved, 0K cma-reserved) May 10 03:33:28.789200 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 May 10 03:33:28.789208 kernel: ftrace: allocating 34584 entries in 136 pages May 10 03:33:28.789215 kernel: ftrace: allocated 136 pages with 2 groups May 10 03:33:28.789225 kernel: rcu: Hierarchical RCU implementation. May 10 03:33:28.789233 kernel: rcu: RCU event tracing is enabled. May 10 03:33:28.789241 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. May 10 03:33:28.789249 kernel: Rude variant of Tasks RCU enabled. May 10 03:33:28.789256 kernel: Tracing variant of Tasks RCU enabled. May 10 03:33:28.789264 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 10 03:33:28.789272 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 May 10 03:33:28.789279 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 May 10 03:33:28.789287 kernel: Console: colour VGA+ 80x25 May 10 03:33:28.789296 kernel: printk: console [tty0] enabled May 10 03:33:28.789304 kernel: printk: console [ttyS0] enabled May 10 03:33:28.789311 kernel: ACPI: Core revision 20210730 May 10 03:33:28.789319 kernel: APIC: Switch to symmetric I/O mode setup May 10 03:33:28.789327 kernel: x2apic enabled May 10 03:33:28.789335 kernel: Switched APIC routing to physical x2apic. May 10 03:33:28.789342 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 10 03:33:28.789350 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 10 03:33:28.789358 kernel: Calibrating delay loop (skipped) preset value.. 3992.49 BogoMIPS (lpj=1996249) May 10 03:33:28.789367 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 May 10 03:33:28.789375 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 May 10 03:33:28.789382 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 10 03:33:28.789390 kernel: Spectre V2 : Mitigation: Retpolines May 10 03:33:28.789398 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 10 03:33:28.789405 kernel: Speculative Store Bypass: Vulnerable May 10 03:33:28.789413 kernel: x86/fpu: x87 FPU will use FXSAVE May 10 03:33:28.789420 kernel: Freeing SMP alternatives memory: 32K May 10 03:33:28.789428 kernel: pid_max: default: 32768 minimum: 301 May 10 03:33:28.789437 kernel: LSM: Security Framework initializing May 10 03:33:28.789444 kernel: SELinux: Initializing. May 10 03:33:28.789452 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 03:33:28.789460 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 10 03:33:28.789467 kernel: smpboot: CPU0: AMD Intel Core i7 9xx (Nehalem Class Core i7) (family: 0x6, model: 0x1a, stepping: 0x3) May 10 03:33:28.789475 kernel: Performance Events: AMD PMU driver. May 10 03:33:28.789488 kernel: ... version: 0 May 10 03:33:28.789497 kernel: ... bit width: 48 May 10 03:33:28.789505 kernel: ... generic registers: 4 May 10 03:33:28.789513 kernel: ... value mask: 0000ffffffffffff May 10 03:33:28.789521 kernel: ... max period: 00007fffffffffff May 10 03:33:28.789528 kernel: ... fixed-purpose events: 0 May 10 03:33:28.789538 kernel: ... event mask: 000000000000000f May 10 03:33:28.789546 kernel: signal: max sigframe size: 1440 May 10 03:33:28.789554 kernel: rcu: Hierarchical SRCU implementation. May 10 03:33:28.789562 kernel: smp: Bringing up secondary CPUs ... May 10 03:33:28.789569 kernel: x86: Booting SMP configuration: May 10 03:33:28.789579 kernel: .... node #0, CPUs: #1 May 10 03:33:28.789587 kernel: kvm-clock: cpu 1, msr 95196041, secondary cpu clock May 10 03:33:28.789595 kernel: kvm-guest: stealtime: cpu 1, msr 13bd1c0c0 May 10 03:33:28.789603 kernel: smp: Brought up 1 node, 2 CPUs May 10 03:33:28.789611 kernel: smpboot: Max logical packages: 2 May 10 03:33:28.789619 kernel: smpboot: Total of 2 processors activated (7984.99 BogoMIPS) May 10 03:33:28.789626 kernel: devtmpfs: initialized May 10 03:33:28.789634 kernel: x86/mm: Memory block size: 128MB May 10 03:33:28.789642 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 10 03:33:28.789652 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) May 10 03:33:28.789660 kernel: pinctrl core: initialized pinctrl subsystem May 10 03:33:28.789668 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 10 03:33:28.789675 kernel: audit: initializing netlink subsys (disabled) May 10 03:33:28.789683 kernel: audit: type=2000 audit(1746848008.164:1): state=initialized audit_enabled=0 res=1 May 10 03:33:28.789691 kernel: thermal_sys: Registered thermal governor 'step_wise' May 10 03:33:28.789699 kernel: thermal_sys: Registered thermal governor 'user_space' May 10 03:33:28.789707 kernel: cpuidle: using governor menu May 10 03:33:28.789715 kernel: ACPI: bus type PCI registered May 10 03:33:28.789725 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 10 03:33:28.789733 kernel: dca service started, version 1.12.1 May 10 03:33:28.789741 kernel: PCI: Using configuration type 1 for base access May 10 03:33:28.789749 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 10 03:33:28.789757 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 10 03:33:28.789765 kernel: ACPI: Added _OSI(Module Device) May 10 03:33:28.789772 kernel: ACPI: Added _OSI(Processor Device) May 10 03:33:28.789780 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 10 03:33:28.789788 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 10 03:33:28.789797 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 10 03:33:28.789805 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 10 03:33:28.789813 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 10 03:33:28.789821 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 10 03:33:28.789829 kernel: ACPI: Interpreter enabled May 10 03:33:28.789837 kernel: ACPI: PM: (supports S0 S3 S5) May 10 03:33:28.789844 kernel: ACPI: Using IOAPIC for interrupt routing May 10 03:33:28.789853 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 10 03:33:28.789861 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F May 10 03:33:28.789870 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 10 03:33:28.790003 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] May 10 03:33:28.790089 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. May 10 03:33:28.790126 kernel: acpiphp: Slot [3] registered May 10 03:33:28.790134 kernel: acpiphp: Slot [4] registered May 10 03:33:28.790142 kernel: acpiphp: Slot [5] registered May 10 03:33:28.790150 kernel: acpiphp: Slot [6] registered May 10 03:33:28.790158 kernel: acpiphp: Slot [7] registered May 10 03:33:28.790168 kernel: acpiphp: Slot [8] registered May 10 03:33:28.790177 kernel: acpiphp: Slot [9] registered May 10 03:33:28.790185 kernel: acpiphp: Slot [10] registered May 10 03:33:28.790193 kernel: acpiphp: Slot [11] registered May 10 03:33:28.790201 kernel: acpiphp: Slot [12] registered May 10 03:33:28.790209 kernel: acpiphp: Slot [13] registered May 10 03:33:28.790216 kernel: acpiphp: Slot [14] registered May 10 03:33:28.790224 kernel: acpiphp: Slot [15] registered May 10 03:33:28.790232 kernel: acpiphp: Slot [16] registered May 10 03:33:28.790242 kernel: acpiphp: Slot [17] registered May 10 03:33:28.790249 kernel: acpiphp: Slot [18] registered May 10 03:33:28.790257 kernel: acpiphp: Slot [19] registered May 10 03:33:28.790265 kernel: acpiphp: Slot [20] registered May 10 03:33:28.790273 kernel: acpiphp: Slot [21] registered May 10 03:33:28.790281 kernel: acpiphp: Slot [22] registered May 10 03:33:28.790289 kernel: acpiphp: Slot [23] registered May 10 03:33:28.790296 kernel: acpiphp: Slot [24] registered May 10 03:33:28.790304 kernel: acpiphp: Slot [25] registered May 10 03:33:28.790312 kernel: acpiphp: Slot [26] registered May 10 03:33:28.790321 kernel: acpiphp: Slot [27] registered May 10 03:33:28.790329 kernel: acpiphp: Slot [28] registered May 10 03:33:28.790337 kernel: acpiphp: Slot [29] registered May 10 03:33:28.790345 kernel: acpiphp: Slot [30] registered May 10 03:33:28.790353 kernel: acpiphp: Slot [31] registered May 10 03:33:28.790360 kernel: PCI host bridge to bus 0000:00 May 10 03:33:28.790449 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 10 03:33:28.790523 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 10 03:33:28.790598 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 10 03:33:28.790669 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 10 03:33:28.790741 kernel: pci_bus 0000:00: root bus resource [mem 0xc000000000-0xc07fffffff window] May 10 03:33:28.790813 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 10 03:33:28.790908 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 May 10 03:33:28.790998 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 May 10 03:33:28.791109 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 May 10 03:33:28.791201 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc120-0xc12f] May 10 03:33:28.791285 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] May 10 03:33:28.791367 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] May 10 03:33:28.791450 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] May 10 03:33:28.791531 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] May 10 03:33:28.791620 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 May 10 03:33:28.791706 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI May 10 03:33:28.791788 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB May 10 03:33:28.791890 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 May 10 03:33:28.791973 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] May 10 03:33:28.792059 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xc000000000-0xc000003fff 64bit pref] May 10 03:33:28.795188 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfeb90000-0xfeb90fff] May 10 03:33:28.795279 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfeb80000-0xfeb8ffff pref] May 10 03:33:28.795367 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 10 03:33:28.795464 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 May 10 03:33:28.795547 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc0bf] May 10 03:33:28.795629 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfeb91000-0xfeb91fff] May 10 03:33:28.795711 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xc000004000-0xc000007fff 64bit pref] May 10 03:33:28.795792 kernel: pci 0000:00:03.0: reg 0x30: [mem 0xfeb00000-0xfeb7ffff pref] May 10 03:33:28.795895 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 May 10 03:33:28.795981 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] May 10 03:33:28.796061 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfeb92000-0xfeb92fff] May 10 03:33:28.796159 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xc000008000-0xc00000bfff 64bit pref] May 10 03:33:28.796249 kernel: pci 0000:00:05.0: [1af4:1002] type 00 class 0x00ff00 May 10 03:33:28.796332 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0c0-0xc0ff] May 10 03:33:28.797136 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xc00000c000-0xc00000ffff 64bit pref] May 10 03:33:28.797241 kernel: pci 0000:00:06.0: [1af4:1005] type 00 class 0x00ff00 May 10 03:33:28.797326 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc100-0xc11f] May 10 03:33:28.797409 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfeb93000-0xfeb93fff] May 10 03:33:28.797491 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xc000010000-0xc000013fff 64bit pref] May 10 03:33:28.797503 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 10 03:33:28.797512 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 10 03:33:28.797520 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 10 03:33:28.797528 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 10 03:33:28.797539 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 May 10 03:33:28.797548 kernel: iommu: Default domain type: Translated May 10 03:33:28.797556 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 10 03:33:28.797635 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device May 10 03:33:28.797717 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 10 03:33:28.797798 kernel: pci 0000:00:02.0: vgaarb: bridge control possible May 10 03:33:28.797810 kernel: vgaarb: loaded May 10 03:33:28.797818 kernel: pps_core: LinuxPPS API ver. 1 registered May 10 03:33:28.797826 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 10 03:33:28.797837 kernel: PTP clock support registered May 10 03:33:28.797846 kernel: PCI: Using ACPI for IRQ routing May 10 03:33:28.797854 kernel: PCI: pci_cache_line_size set to 64 bytes May 10 03:33:28.797862 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 10 03:33:28.797870 kernel: e820: reserve RAM buffer [mem 0xbffdd000-0xbfffffff] May 10 03:33:28.797878 kernel: clocksource: Switched to clocksource kvm-clock May 10 03:33:28.797886 kernel: VFS: Disk quotas dquot_6.6.0 May 10 03:33:28.797894 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 10 03:33:28.797902 kernel: pnp: PnP ACPI init May 10 03:33:28.797986 kernel: pnp 00:03: [dma 2] May 10 03:33:28.797999 kernel: pnp: PnP ACPI: found 5 devices May 10 03:33:28.798007 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 10 03:33:28.798016 kernel: NET: Registered PF_INET protocol family May 10 03:33:28.798025 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 10 03:33:28.798033 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 10 03:33:28.798041 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 10 03:33:28.798049 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 10 03:33:28.798060 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 10 03:33:28.798068 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 10 03:33:28.798077 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 03:33:28.798085 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 10 03:33:28.798093 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 10 03:33:28.798151 kernel: NET: Registered PF_XDP protocol family May 10 03:33:28.798228 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 10 03:33:28.798299 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 10 03:33:28.798369 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 10 03:33:28.798443 kernel: pci_bus 0000:00: resource 7 [mem 0xc0000000-0xfebfffff window] May 10 03:33:28.798512 kernel: pci_bus 0000:00: resource 8 [mem 0xc000000000-0xc07fffffff window] May 10 03:33:28.798593 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release May 10 03:33:28.798673 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers May 10 03:33:28.798754 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds May 10 03:33:28.798766 kernel: PCI: CLS 0 bytes, default 64 May 10 03:33:28.798774 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) May 10 03:33:28.798782 kernel: software IO TLB: mapped [mem 0x00000000bbfdd000-0x00000000bffdd000] (64MB) May 10 03:33:28.798794 kernel: Initialise system trusted keyrings May 10 03:33:28.798802 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 10 03:33:28.798810 kernel: Key type asymmetric registered May 10 03:33:28.798818 kernel: Asymmetric key parser 'x509' registered May 10 03:33:28.798826 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 10 03:33:28.798834 kernel: io scheduler mq-deadline registered May 10 03:33:28.798842 kernel: io scheduler kyber registered May 10 03:33:28.798851 kernel: io scheduler bfq registered May 10 03:33:28.798859 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 10 03:33:28.798869 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 May 10 03:33:28.798877 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 May 10 03:33:28.798886 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 May 10 03:33:28.798894 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 May 10 03:33:28.798902 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 10 03:33:28.798911 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 10 03:33:28.798919 kernel: random: crng init done May 10 03:33:28.798927 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 10 03:33:28.798935 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 10 03:33:28.798945 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 10 03:33:28.798953 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 10 03:33:28.799031 kernel: rtc_cmos 00:04: RTC can wake from S4 May 10 03:33:28.799122 kernel: rtc_cmos 00:04: registered as rtc0 May 10 03:33:28.799198 kernel: rtc_cmos 00:04: setting system clock to 2025-05-10T03:33:28 UTC (1746848008) May 10 03:33:28.799271 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram May 10 03:33:28.799283 kernel: NET: Registered PF_INET6 protocol family May 10 03:33:28.799291 kernel: Segment Routing with IPv6 May 10 03:33:28.799303 kernel: In-situ OAM (IOAM) with IPv6 May 10 03:33:28.799311 kernel: NET: Registered PF_PACKET protocol family May 10 03:33:28.799319 kernel: Key type dns_resolver registered May 10 03:33:28.799327 kernel: IPI shorthand broadcast: enabled May 10 03:33:28.799335 kernel: sched_clock: Marking stable (832957286, 163548653)->(1056217796, -59711857) May 10 03:33:28.799343 kernel: registered taskstats version 1 May 10 03:33:28.799351 kernel: Loading compiled-in X.509 certificates May 10 03:33:28.799360 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.181-flatcar: 0c62a22cd9157131d2e97d5a2e1bd9023e187117' May 10 03:33:28.799368 kernel: Key type .fscrypt registered May 10 03:33:28.799378 kernel: Key type fscrypt-provisioning registered May 10 03:33:28.799386 kernel: ima: No TPM chip found, activating TPM-bypass! May 10 03:33:28.799394 kernel: ima: Allocated hash algorithm: sha1 May 10 03:33:28.799402 kernel: ima: No architecture policies found May 10 03:33:28.799410 kernel: clk: Disabling unused clocks May 10 03:33:28.799418 kernel: Freeing unused kernel image (initmem) memory: 47456K May 10 03:33:28.799426 kernel: Write protecting the kernel read-only data: 28672k May 10 03:33:28.799435 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 10 03:33:28.799444 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 10 03:33:28.799453 kernel: Run /init as init process May 10 03:33:28.799461 kernel: with arguments: May 10 03:33:28.799469 kernel: /init May 10 03:33:28.799476 kernel: with environment: May 10 03:33:28.799484 kernel: HOME=/ May 10 03:33:28.799492 kernel: TERM=linux May 10 03:33:28.799500 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 10 03:33:28.799511 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 03:33:28.799524 systemd[1]: Detected virtualization kvm. May 10 03:33:28.799533 systemd[1]: Detected architecture x86-64. May 10 03:33:28.799542 systemd[1]: Running in initrd. May 10 03:33:28.799551 systemd[1]: No hostname configured, using default hostname. May 10 03:33:28.799559 systemd[1]: Hostname set to . May 10 03:33:28.799569 systemd[1]: Initializing machine ID from VM UUID. May 10 03:33:28.799578 systemd[1]: Queued start job for default target initrd.target. May 10 03:33:28.799588 systemd[1]: Started systemd-ask-password-console.path. May 10 03:33:28.799597 systemd[1]: Reached target cryptsetup.target. May 10 03:33:28.799605 systemd[1]: Reached target paths.target. May 10 03:33:28.799614 systemd[1]: Reached target slices.target. May 10 03:33:28.799622 systemd[1]: Reached target swap.target. May 10 03:33:28.799631 systemd[1]: Reached target timers.target. May 10 03:33:28.799640 systemd[1]: Listening on iscsid.socket. May 10 03:33:28.799648 systemd[1]: Listening on iscsiuio.socket. May 10 03:33:28.799659 systemd[1]: Listening on systemd-journald-audit.socket. May 10 03:33:28.799675 systemd[1]: Listening on systemd-journald-dev-log.socket. May 10 03:33:28.799686 systemd[1]: Listening on systemd-journald.socket. May 10 03:33:28.799695 systemd[1]: Listening on systemd-networkd.socket. May 10 03:33:28.799704 systemd[1]: Listening on systemd-udevd-control.socket. May 10 03:33:28.799713 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 03:33:28.799723 systemd[1]: Reached target sockets.target. May 10 03:33:28.799732 systemd[1]: Starting kmod-static-nodes.service... May 10 03:33:28.799741 systemd[1]: Finished network-cleanup.service. May 10 03:33:28.799750 systemd[1]: Starting systemd-fsck-usr.service... May 10 03:33:28.799759 systemd[1]: Starting systemd-journald.service... May 10 03:33:28.799768 systemd[1]: Starting systemd-modules-load.service... May 10 03:33:28.799777 systemd[1]: Starting systemd-resolved.service... May 10 03:33:28.799786 systemd[1]: Starting systemd-vconsole-setup.service... May 10 03:33:28.799795 systemd[1]: Finished kmod-static-nodes.service. May 10 03:33:28.799817 kernel: audit: type=1130 audit(1746848008.796:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.799826 systemd[1]: Finished systemd-fsck-usr.service. May 10 03:33:28.799838 systemd-journald[186]: Journal started May 10 03:33:28.799881 systemd-journald[186]: Runtime Journal (/run/log/journal/46d0021e7eab48a8b784fbaa0c26de4c) is 8.0M, max 78.4M, 70.4M free. May 10 03:33:28.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.792303 systemd-modules-load[187]: Inserted module 'overlay' May 10 03:33:28.868009 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 10 03:33:28.868034 kernel: Bridge firewalling registered May 10 03:33:28.868046 systemd[1]: Started systemd-journald.service. May 10 03:33:28.868061 kernel: audit: type=1130 audit(1746848008.859:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.868075 kernel: SCSI subsystem initialized May 10 03:33:28.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.831675 systemd-resolved[188]: Positive Trust Anchors: May 10 03:33:28.873237 kernel: audit: type=1130 audit(1746848008.868:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.831690 systemd-resolved[188]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 03:33:28.879217 kernel: audit: type=1130 audit(1746848008.873:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.831728 systemd-resolved[188]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 03:33:28.892907 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 10 03:33:28.892925 kernel: device-mapper: uevent: version 1.0.3 May 10 03:33:28.892938 kernel: audit: type=1130 audit(1746848008.879:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.892950 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 10 03:33:28.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.834697 systemd-resolved[188]: Defaulting to hostname 'linux'. May 10 03:33:28.835578 systemd-modules-load[187]: Inserted module 'br_netfilter' May 10 03:33:28.868637 systemd[1]: Started systemd-resolved.service. May 10 03:33:28.873837 systemd[1]: Finished systemd-vconsole-setup.service. May 10 03:33:28.879843 systemd[1]: Reached target nss-lookup.target. May 10 03:33:28.892575 systemd-modules-load[187]: Inserted module 'dm_multipath' May 10 03:33:28.894031 systemd[1]: Starting dracut-cmdline-ask.service... May 10 03:33:28.895125 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 10 03:33:28.900792 systemd[1]: Finished systemd-modules-load.service. May 10 03:33:28.907422 kernel: audit: type=1130 audit(1746848008.901:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.901508 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 10 03:33:28.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.913629 kernel: audit: type=1130 audit(1746848008.908:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.913738 systemd[1]: Starting systemd-sysctl.service... May 10 03:33:28.919213 systemd[1]: Finished dracut-cmdline-ask.service. May 10 03:33:28.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.922380 systemd[1]: Finished systemd-sysctl.service. May 10 03:33:28.925603 kernel: audit: type=1130 audit(1746848008.920:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.925961 systemd[1]: Starting dracut-cmdline.service... May 10 03:33:28.931742 kernel: audit: type=1130 audit(1746848008.925:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:28.937658 dracut-cmdline[207]: dracut-dracut-053 May 10 03:33:28.940798 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=openstack verity.usrhash=39569409b30be1967efab22b453b92a780dcf0fe8e1448a18bf235b5cf33e54a May 10 03:33:29.010154 kernel: Loading iSCSI transport class v2.0-870. May 10 03:33:29.030203 kernel: iscsi: registered transport (tcp) May 10 03:33:29.055199 kernel: iscsi: registered transport (qla4xxx) May 10 03:33:29.055277 kernel: QLogic iSCSI HBA Driver May 10 03:33:29.115471 systemd[1]: Finished dracut-cmdline.service. May 10 03:33:29.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:29.118723 systemd[1]: Starting dracut-pre-udev.service... May 10 03:33:29.176155 kernel: raid6: sse2x4 gen() 12840 MB/s May 10 03:33:29.194148 kernel: raid6: sse2x4 xor() 5003 MB/s May 10 03:33:29.212132 kernel: raid6: sse2x2 gen() 13964 MB/s May 10 03:33:29.230153 kernel: raid6: sse2x2 xor() 8640 MB/s May 10 03:33:29.248181 kernel: raid6: sse2x1 gen() 10924 MB/s May 10 03:33:29.266517 kernel: raid6: sse2x1 xor() 6938 MB/s May 10 03:33:29.266585 kernel: raid6: using algorithm sse2x2 gen() 13964 MB/s May 10 03:33:29.266609 kernel: raid6: .... xor() 8640 MB/s, rmw enabled May 10 03:33:29.267693 kernel: raid6: using ssse3x2 recovery algorithm May 10 03:33:29.287775 kernel: xor: measuring software checksum speed May 10 03:33:29.287854 kernel: prefetch64-sse : 18295 MB/sec May 10 03:33:29.289082 kernel: generic_sse : 15513 MB/sec May 10 03:33:29.289130 kernel: xor: using function: prefetch64-sse (18295 MB/sec) May 10 03:33:29.408169 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 10 03:33:29.424987 systemd[1]: Finished dracut-pre-udev.service. May 10 03:33:29.425000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:29.425000 audit: BPF prog-id=7 op=LOAD May 10 03:33:29.426000 audit: BPF prog-id=8 op=LOAD May 10 03:33:29.426667 systemd[1]: Starting systemd-udevd.service... May 10 03:33:29.441796 systemd-udevd[385]: Using default interface naming scheme 'v252'. May 10 03:33:29.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:29.446647 systemd[1]: Started systemd-udevd.service. May 10 03:33:29.451912 systemd[1]: Starting dracut-pre-trigger.service... May 10 03:33:29.479998 dracut-pre-trigger[406]: rd.md=0: removing MD RAID activation May 10 03:33:29.518289 systemd[1]: Finished dracut-pre-trigger.service. May 10 03:33:29.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:29.519718 systemd[1]: Starting systemd-udev-trigger.service... May 10 03:33:29.561026 systemd[1]: Finished systemd-udev-trigger.service. May 10 03:33:29.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:29.606283 kernel: virtio_blk virtio2: [vda] 20971520 512-byte logical blocks (10.7 GB/10.0 GiB) May 10 03:33:29.631216 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 10 03:33:29.631232 kernel: GPT:17805311 != 20971519 May 10 03:33:29.631243 kernel: GPT:Alternate GPT header not at the end of the disk. May 10 03:33:29.631253 kernel: GPT:17805311 != 20971519 May 10 03:33:29.631263 kernel: GPT: Use GNU Parted to correct GPT errors. May 10 03:33:29.631272 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 03:33:29.653124 kernel: libata version 3.00 loaded. May 10 03:33:29.660751 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (440) May 10 03:33:29.670901 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 10 03:33:29.716591 kernel: ata_piix 0000:00:01.1: version 2.13 May 10 03:33:29.716728 kernel: scsi host0: ata_piix May 10 03:33:29.716838 kernel: scsi host1: ata_piix May 10 03:33:29.716939 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc120 irq 14 May 10 03:33:29.716952 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc128 irq 15 May 10 03:33:29.717604 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 10 03:33:29.723358 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 10 03:33:29.728814 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 10 03:33:29.733242 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 03:33:29.734709 systemd[1]: Starting disk-uuid.service... May 10 03:33:29.747569 disk-uuid[471]: Primary Header is updated. May 10 03:33:29.747569 disk-uuid[471]: Secondary Entries is updated. May 10 03:33:29.747569 disk-uuid[471]: Secondary Header is updated. May 10 03:33:29.759131 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 03:33:29.770140 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 03:33:30.781158 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 10 03:33:30.781366 disk-uuid[472]: The operation has completed successfully. May 10 03:33:30.853516 systemd[1]: disk-uuid.service: Deactivated successfully. May 10 03:33:30.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:30.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:30.853732 systemd[1]: Finished disk-uuid.service. May 10 03:33:30.868134 systemd[1]: Starting verity-setup.service... May 10 03:33:30.886166 kernel: device-mapper: verity: sha256 using implementation "sha256-ssse3" May 10 03:33:31.000378 systemd[1]: Found device dev-mapper-usr.device. May 10 03:33:31.003256 systemd[1]: Mounting sysusr-usr.mount... May 10 03:33:31.006356 systemd[1]: Finished verity-setup.service. May 10 03:33:31.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.146180 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 10 03:33:31.146133 systemd[1]: Mounted sysusr-usr.mount. May 10 03:33:31.146750 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 10 03:33:31.147419 systemd[1]: Starting ignition-setup.service... May 10 03:33:31.154539 systemd[1]: Starting parse-ip-for-networkd.service... May 10 03:33:31.171169 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 03:33:31.171266 kernel: BTRFS info (device vda6): using free space tree May 10 03:33:31.171296 kernel: BTRFS info (device vda6): has skinny extents May 10 03:33:31.200838 systemd[1]: mnt-oem.mount: Deactivated successfully. May 10 03:33:31.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.222532 systemd[1]: Finished ignition-setup.service. May 10 03:33:31.227391 systemd[1]: Starting ignition-fetch-offline.service... May 10 03:33:31.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.269828 systemd[1]: Finished parse-ip-for-networkd.service. May 10 03:33:31.272000 audit: BPF prog-id=9 op=LOAD May 10 03:33:31.274153 systemd[1]: Starting systemd-networkd.service... May 10 03:33:31.300993 systemd-networkd[643]: lo: Link UP May 10 03:33:31.302073 systemd-networkd[643]: lo: Gained carrier May 10 03:33:31.303148 systemd-networkd[643]: Enumeration completed May 10 03:33:31.304503 systemd-networkd[643]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 03:33:31.305501 systemd[1]: Started systemd-networkd.service. May 10 03:33:31.307351 systemd-networkd[643]: eth0: Link UP May 10 03:33:31.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.307382 systemd-networkd[643]: eth0: Gained carrier May 10 03:33:31.308375 systemd[1]: Reached target network.target. May 10 03:33:31.309566 systemd[1]: Starting iscsiuio.service... May 10 03:33:31.320272 systemd-networkd[643]: eth0: DHCPv4 address 172.24.4.212/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 10 03:33:31.323315 systemd[1]: Started iscsiuio.service. May 10 03:33:31.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.333304 systemd[1]: Starting iscsid.service... May 10 03:33:31.335530 iscsid[648]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 10 03:33:31.335530 iscsid[648]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 10 03:33:31.335530 iscsid[648]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 10 03:33:31.339000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.340850 iscsid[648]: If using hardware iscsi like qla4xxx this message can be ignored. May 10 03:33:31.340850 iscsid[648]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 10 03:33:31.340850 iscsid[648]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 10 03:33:31.338969 systemd[1]: Started iscsid.service. May 10 03:33:31.340305 systemd[1]: Starting dracut-initqueue.service... May 10 03:33:31.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.356289 systemd[1]: Finished dracut-initqueue.service. May 10 03:33:31.356817 systemd[1]: Reached target remote-fs-pre.target. May 10 03:33:31.357281 systemd[1]: Reached target remote-cryptsetup.target. May 10 03:33:31.357784 systemd[1]: Reached target remote-fs.target. May 10 03:33:31.359528 systemd[1]: Starting dracut-pre-mount.service... May 10 03:33:31.369116 systemd[1]: Finished dracut-pre-mount.service. May 10 03:33:31.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.532632 ignition[601]: Ignition 2.14.0 May 10 03:33:31.532659 ignition[601]: Stage: fetch-offline May 10 03:33:31.532763 ignition[601]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 03:33:31.532807 ignition[601]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 03:33:31.534962 ignition[601]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 03:33:31.535249 ignition[601]: parsed url from cmdline: "" May 10 03:33:31.535259 ignition[601]: no config URL provided May 10 03:33:31.535272 ignition[601]: reading system config file "/usr/lib/ignition/user.ign" May 10 03:33:31.535292 ignition[601]: no config at "/usr/lib/ignition/user.ign" May 10 03:33:31.537472 systemd[1]: Finished ignition-fetch-offline.service. May 10 03:33:31.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.535306 ignition[601]: failed to fetch config: resource requires networking May 10 03:33:31.535911 ignition[601]: Ignition finished successfully May 10 03:33:31.540941 systemd[1]: Starting ignition-fetch.service... May 10 03:33:31.549974 ignition[667]: Ignition 2.14.0 May 10 03:33:31.550814 ignition[667]: Stage: fetch May 10 03:33:31.551455 ignition[667]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 03:33:31.552224 ignition[667]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 03:33:31.553326 ignition[667]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 03:33:31.554142 ignition[667]: parsed url from cmdline: "" May 10 03:33:31.554218 ignition[667]: no config URL provided May 10 03:33:31.554709 ignition[667]: reading system config file "/usr/lib/ignition/user.ign" May 10 03:33:31.555421 ignition[667]: no config at "/usr/lib/ignition/user.ign" May 10 03:33:31.560594 ignition[667]: config drive ("/dev/disk/by-label/config-2") not found. Waiting... May 10 03:33:31.560687 ignition[667]: GET http://169.254.169.254/openstack/latest/user_data: attempt #1 May 10 03:33:31.561630 ignition[667]: config drive ("/dev/disk/by-label/CONFIG-2") not found. Waiting... May 10 03:33:31.815248 ignition[667]: GET result: OK May 10 03:33:31.815442 ignition[667]: parsing config with SHA512: 10a5106b51a4c27a9604b0138a48a65ca6646d6e53767b239cd57ece4e609a7701063f800e887950ccd4704633b9c213e0a7607f9a653f65d5c3c8ac11a69371 May 10 03:33:31.833484 unknown[667]: fetched base config from "system" May 10 03:33:31.834201 unknown[667]: fetched base config from "system" May 10 03:33:31.834218 unknown[667]: fetched user config from "openstack" May 10 03:33:31.835205 ignition[667]: fetch: fetch complete May 10 03:33:31.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.837667 systemd[1]: Finished ignition-fetch.service. May 10 03:33:31.835217 ignition[667]: fetch: fetch passed May 10 03:33:31.840324 systemd[1]: Starting ignition-kargs.service... May 10 03:33:31.835304 ignition[667]: Ignition finished successfully May 10 03:33:31.862090 ignition[673]: Ignition 2.14.0 May 10 03:33:31.862147 ignition[673]: Stage: kargs May 10 03:33:31.862357 ignition[673]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 03:33:31.862395 ignition[673]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 03:33:31.864441 ignition[673]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 03:33:31.866934 ignition[673]: kargs: kargs passed May 10 03:33:31.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.869657 systemd[1]: Finished ignition-kargs.service. May 10 03:33:31.867015 ignition[673]: Ignition finished successfully May 10 03:33:31.872818 systemd[1]: Starting ignition-disks.service... May 10 03:33:31.888388 ignition[679]: Ignition 2.14.0 May 10 03:33:31.888412 ignition[679]: Stage: disks May 10 03:33:31.888622 ignition[679]: reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 03:33:31.888660 ignition[679]: parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 03:33:31.890640 ignition[679]: no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 03:33:31.892986 ignition[679]: disks: disks passed May 10 03:33:31.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.894566 systemd[1]: Finished ignition-disks.service. May 10 03:33:31.893068 ignition[679]: Ignition finished successfully May 10 03:33:31.897262 systemd[1]: Reached target initrd-root-device.target. May 10 03:33:31.899138 systemd[1]: Reached target local-fs-pre.target. May 10 03:33:31.901378 systemd[1]: Reached target local-fs.target. May 10 03:33:31.903476 systemd[1]: Reached target sysinit.target. May 10 03:33:31.905773 systemd[1]: Reached target basic.target. May 10 03:33:31.909674 systemd[1]: Starting systemd-fsck-root.service... May 10 03:33:31.938065 systemd-fsck[687]: ROOT: clean, 623/1628000 files, 124060/1617920 blocks May 10 03:33:31.949078 systemd[1]: Finished systemd-fsck-root.service. May 10 03:33:31.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:31.951617 systemd[1]: Mounting sysroot.mount... May 10 03:33:31.972179 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 10 03:33:31.972871 systemd[1]: Mounted sysroot.mount. May 10 03:33:31.975155 systemd[1]: Reached target initrd-root-fs.target. May 10 03:33:31.980160 systemd[1]: Mounting sysroot-usr.mount... May 10 03:33:31.981987 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 10 03:33:31.983494 systemd[1]: Starting flatcar-openstack-hostname.service... May 10 03:33:31.990416 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 10 03:33:31.990507 systemd[1]: Reached target ignition-diskful.target. May 10 03:33:31.996143 systemd[1]: Mounted sysroot-usr.mount. May 10 03:33:32.001015 systemd[1]: Starting initrd-setup-root.service... May 10 03:33:32.010957 initrd-setup-root[698]: cut: /sysroot/etc/passwd: No such file or directory May 10 03:33:32.031350 initrd-setup-root[706]: cut: /sysroot/etc/group: No such file or directory May 10 03:33:32.042864 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 03:33:32.052204 initrd-setup-root[715]: cut: /sysroot/etc/shadow: No such file or directory May 10 03:33:32.060318 initrd-setup-root[723]: cut: /sysroot/etc/gshadow: No such file or directory May 10 03:33:32.062654 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (713) May 10 03:33:32.068390 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 03:33:32.068473 kernel: BTRFS info (device vda6): using free space tree May 10 03:33:32.068492 kernel: BTRFS info (device vda6): has skinny extents May 10 03:33:32.092738 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 03:33:32.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:32.150746 systemd[1]: Finished initrd-setup-root.service. May 10 03:33:32.152766 systemd[1]: Starting ignition-mount.service... May 10 03:33:32.154429 systemd[1]: Starting sysroot-boot.service... May 10 03:33:32.163015 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. May 10 03:33:32.163909 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. May 10 03:33:32.176799 ignition[762]: INFO : Ignition 2.14.0 May 10 03:33:32.177630 ignition[762]: INFO : Stage: mount May 10 03:33:32.178297 ignition[762]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 03:33:32.179057 ignition[762]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 03:33:32.181388 ignition[762]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 03:33:32.183455 ignition[762]: INFO : mount: mount passed May 10 03:33:32.184030 ignition[762]: INFO : Ignition finished successfully May 10 03:33:32.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:32.185241 systemd[1]: Finished ignition-mount.service. May 10 03:33:32.200634 systemd[1]: Finished sysroot-boot.service. May 10 03:33:32.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:32.222262 coreos-metadata[693]: May 10 03:33:32.222 INFO Fetching http://169.254.169.254/latest/meta-data/hostname: Attempt #1 May 10 03:33:32.240073 coreos-metadata[693]: May 10 03:33:32.240 INFO Fetch successful May 10 03:33:32.240857 coreos-metadata[693]: May 10 03:33:32.240 INFO wrote hostname ci-3510-3-7-n-13802d7031.novalocal to /sysroot/etc/hostname May 10 03:33:32.246411 systemd[1]: flatcar-openstack-hostname.service: Deactivated successfully. May 10 03:33:32.246622 systemd[1]: Finished flatcar-openstack-hostname.service. May 10 03:33:32.248000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:32.248000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-openstack-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:32.250330 systemd[1]: Starting ignition-files.service... May 10 03:33:32.261322 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 10 03:33:32.277166 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/vda6 scanned by mount (770) May 10 03:33:32.287141 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 10 03:33:32.287211 kernel: BTRFS info (device vda6): using free space tree May 10 03:33:32.287233 kernel: BTRFS info (device vda6): has skinny extents May 10 03:33:32.301088 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 10 03:33:32.322355 ignition[789]: INFO : Ignition 2.14.0 May 10 03:33:32.322355 ignition[789]: INFO : Stage: files May 10 03:33:32.324423 ignition[789]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 03:33:32.324423 ignition[789]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 03:33:32.327998 ignition[789]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 03:33:32.329398 ignition[789]: DEBUG : files: compiled without relabeling support, skipping May 10 03:33:32.330865 ignition[789]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 10 03:33:32.330865 ignition[789]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 10 03:33:32.336514 ignition[789]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 10 03:33:32.338193 ignition[789]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 10 03:33:32.340243 unknown[789]: wrote ssh authorized keys file for user: core May 10 03:33:32.342020 ignition[789]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 10 03:33:32.345502 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 03:33:32.348220 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 10 03:33:32.417800 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 10 03:33:32.706066 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 10 03:33:32.706066 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 03:33:32.711013 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 10 03:33:32.904359 systemd-networkd[643]: eth0: Gained IPv6LL May 10 03:33:33.412654 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 10 03:33:35.131113 ignition[789]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 10 03:33:35.132612 ignition[789]: INFO : files: op(b): [started] processing unit "coreos-metadata-sshkeys@.service" May 10 03:33:35.133387 ignition[789]: INFO : files: op(b): [finished] processing unit "coreos-metadata-sshkeys@.service" May 10 03:33:35.134262 ignition[789]: INFO : files: op(c): [started] processing unit "prepare-helm.service" May 10 03:33:35.151873 ignition[789]: INFO : files: op(c): op(d): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 03:33:35.160756 ignition[789]: INFO : files: op(c): op(d): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 10 03:33:35.164140 ignition[789]: INFO : files: op(c): [finished] processing unit "prepare-helm.service" May 10 03:33:35.164140 ignition[789]: INFO : files: op(e): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 03:33:35.164140 ignition[789]: INFO : files: op(e): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " May 10 03:33:35.164140 ignition[789]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 10 03:33:35.164140 ignition[789]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 10 03:33:35.227410 ignition[789]: INFO : files: createResultFile: createFiles: op(10): [started] writing file "/sysroot/etc/.ignition-result.json" May 10 03:33:35.230207 ignition[789]: INFO : files: createResultFile: createFiles: op(10): [finished] writing file "/sysroot/etc/.ignition-result.json" May 10 03:33:35.232427 ignition[789]: INFO : files: files passed May 10 03:33:35.232427 ignition[789]: INFO : Ignition finished successfully May 10 03:33:35.252532 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 03:33:35.252581 kernel: audit: type=1130 audit(1746848015.239:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.233914 systemd[1]: Finished ignition-files.service. May 10 03:33:35.245623 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 10 03:33:35.256332 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 10 03:33:35.258411 systemd[1]: Starting ignition-quench.service... May 10 03:33:35.264669 systemd[1]: ignition-quench.service: Deactivated successfully. May 10 03:33:35.264841 systemd[1]: Finished ignition-quench.service. May 10 03:33:35.300277 kernel: audit: type=1130 audit(1746848015.268:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.300319 kernel: audit: type=1131 audit(1746848015.268:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.300341 kernel: audit: type=1130 audit(1746848015.290:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.268000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.300515 initrd-setup-root-after-ignition[814]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 10 03:33:35.273036 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 10 03:33:35.290699 systemd[1]: Reached target ignition-complete.target. May 10 03:33:35.303182 systemd[1]: Starting initrd-parse-etc.service... May 10 03:33:35.339902 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 10 03:33:35.341647 systemd[1]: Finished initrd-parse-etc.service. May 10 03:33:35.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.348597 systemd[1]: Reached target initrd-fs.target. May 10 03:33:35.370420 kernel: audit: type=1130 audit(1746848015.344:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.370467 kernel: audit: type=1131 audit(1746848015.348:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.367529 systemd[1]: Reached target initrd.target. May 10 03:33:35.368750 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 10 03:33:35.370641 systemd[1]: Starting dracut-pre-pivot.service... May 10 03:33:35.397986 systemd[1]: Finished dracut-pre-pivot.service. May 10 03:33:35.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.401315 systemd[1]: Starting initrd-cleanup.service... May 10 03:33:35.414344 kernel: audit: type=1130 audit(1746848015.399:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.435359 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 10 03:33:35.435599 systemd[1]: Finished initrd-cleanup.service. May 10 03:33:35.458033 kernel: audit: type=1130 audit(1746848015.438:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.458077 kernel: audit: type=1131 audit(1746848015.438:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.438563 systemd[1]: Stopped target nss-lookup.target. May 10 03:33:35.459233 systemd[1]: Stopped target remote-cryptsetup.target. May 10 03:33:35.460869 systemd[1]: Stopped target timers.target. May 10 03:33:35.462619 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 10 03:33:35.469463 kernel: audit: type=1131 audit(1746848015.464:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.464000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.462723 systemd[1]: Stopped dracut-pre-pivot.service. May 10 03:33:35.464409 systemd[1]: Stopped target initrd.target. May 10 03:33:35.470597 systemd[1]: Stopped target basic.target. May 10 03:33:35.472206 systemd[1]: Stopped target ignition-complete.target. May 10 03:33:35.473872 systemd[1]: Stopped target ignition-diskful.target. May 10 03:33:35.475528 systemd[1]: Stopped target initrd-root-device.target. May 10 03:33:35.477292 systemd[1]: Stopped target remote-fs.target. May 10 03:33:35.478897 systemd[1]: Stopped target remote-fs-pre.target. May 10 03:33:35.480615 systemd[1]: Stopped target sysinit.target. May 10 03:33:35.482248 systemd[1]: Stopped target local-fs.target. May 10 03:33:35.483886 systemd[1]: Stopped target local-fs-pre.target. May 10 03:33:35.485576 systemd[1]: Stopped target swap.target. May 10 03:33:35.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.487185 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 10 03:33:35.487285 systemd[1]: Stopped dracut-pre-mount.service. May 10 03:33:35.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.488878 systemd[1]: Stopped target cryptsetup.target. May 10 03:33:35.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.490416 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 10 03:33:35.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.490512 systemd[1]: Stopped dracut-initqueue.service. May 10 03:33:35.492370 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 10 03:33:35.492458 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 10 03:33:35.494012 systemd[1]: ignition-files.service: Deactivated successfully. May 10 03:33:35.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.494135 systemd[1]: Stopped ignition-files.service. May 10 03:33:35.497055 systemd[1]: Stopping ignition-mount.service... May 10 03:33:35.509000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.498733 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 10 03:33:35.498852 systemd[1]: Stopped kmod-static-nodes.service. May 10 03:33:35.501901 systemd[1]: Stopping sysroot-boot.service... May 10 03:33:35.509128 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 10 03:33:35.509243 systemd[1]: Stopped systemd-udev-trigger.service. May 10 03:33:35.509884 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 10 03:33:35.509930 systemd[1]: Stopped dracut-pre-trigger.service. May 10 03:33:35.521887 ignition[827]: INFO : Ignition 2.14.0 May 10 03:33:35.522652 ignition[827]: INFO : Stage: umount May 10 03:33:35.523313 ignition[827]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" May 10 03:33:35.530116 ignition[827]: DEBUG : parsing config with SHA512: ce918cf8568bff1426dda9ea05b778568a1626fcf4c1bded9ebe13fee104bc1b92fac5f7093a3bfc7d99777c3793d01249c863845c2ca48413d9477d40af178a May 10 03:33:35.530116 ignition[827]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/openstack" May 10 03:33:35.532533 ignition[827]: INFO : umount: umount passed May 10 03:33:35.533147 ignition[827]: INFO : Ignition finished successfully May 10 03:33:35.535000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.534828 systemd[1]: ignition-mount.service: Deactivated successfully. May 10 03:33:35.534944 systemd[1]: Stopped ignition-mount.service. May 10 03:33:35.535567 systemd[1]: ignition-disks.service: Deactivated successfully. May 10 03:33:35.535613 systemd[1]: Stopped ignition-disks.service. May 10 03:33:35.536213 systemd[1]: ignition-kargs.service: Deactivated successfully. May 10 03:33:35.536259 systemd[1]: Stopped ignition-kargs.service. May 10 03:33:35.536757 systemd[1]: ignition-fetch.service: Deactivated successfully. May 10 03:33:35.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.536796 systemd[1]: Stopped ignition-fetch.service. May 10 03:33:35.537365 systemd[1]: Stopped target network.target. May 10 03:33:35.537819 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 10 03:33:35.537862 systemd[1]: Stopped ignition-fetch-offline.service. May 10 03:33:35.543120 systemd[1]: Stopped target paths.target. May 10 03:33:35.544755 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 10 03:33:35.550155 systemd[1]: Stopped systemd-ask-password-console.path. May 10 03:33:35.550660 systemd[1]: Stopped target slices.target. May 10 03:33:35.551136 systemd[1]: Stopped target sockets.target. May 10 03:33:35.551674 systemd[1]: iscsid.socket: Deactivated successfully. May 10 03:33:35.554000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.551698 systemd[1]: Closed iscsid.socket. May 10 03:33:35.552689 systemd[1]: iscsiuio.socket: Deactivated successfully. May 10 03:33:35.552716 systemd[1]: Closed iscsiuio.socket. May 10 03:33:35.553575 systemd[1]: ignition-setup.service: Deactivated successfully. May 10 03:33:35.553616 systemd[1]: Stopped ignition-setup.service. May 10 03:33:35.554925 systemd[1]: Stopping systemd-networkd.service... May 10 03:33:35.555666 systemd[1]: Stopping systemd-resolved.service... May 10 03:33:35.557694 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 10 03:33:35.560000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.558150 systemd-networkd[643]: eth0: DHCPv6 lease lost May 10 03:33:35.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.559384 systemd[1]: sysroot-boot.service: Deactivated successfully. May 10 03:33:35.562000 audit: BPF prog-id=9 op=UNLOAD May 10 03:33:35.559484 systemd[1]: Stopped sysroot-boot.service. May 10 03:33:35.563000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.560378 systemd[1]: systemd-networkd.service: Deactivated successfully. May 10 03:33:35.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.560482 systemd[1]: Stopped systemd-networkd.service. May 10 03:33:35.568000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.561899 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 10 03:33:35.561934 systemd[1]: Closed systemd-networkd.socket. May 10 03:33:35.562654 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 10 03:33:35.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.562701 systemd[1]: Stopped initrd-setup-root.service. May 10 03:33:35.564659 systemd[1]: Stopping network-cleanup.service... May 10 03:33:35.566647 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 10 03:33:35.566715 systemd[1]: Stopped parse-ip-for-networkd.service. May 10 03:33:35.567247 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 10 03:33:35.580000 audit: BPF prog-id=6 op=UNLOAD May 10 03:33:35.567287 systemd[1]: Stopped systemd-sysctl.service. May 10 03:33:35.568125 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 10 03:33:35.581000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.568164 systemd[1]: Stopped systemd-modules-load.service. May 10 03:33:35.569064 systemd[1]: Stopping systemd-udevd.service... May 10 03:33:35.574658 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 10 03:33:35.575142 systemd[1]: systemd-resolved.service: Deactivated successfully. May 10 03:33:35.575240 systemd[1]: Stopped systemd-resolved.service. May 10 03:33:35.581055 systemd[1]: network-cleanup.service: Deactivated successfully. May 10 03:33:35.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.581177 systemd[1]: Stopped network-cleanup.service. May 10 03:33:35.585525 systemd[1]: systemd-udevd.service: Deactivated successfully. May 10 03:33:35.585637 systemd[1]: Stopped systemd-udevd.service. May 10 03:33:35.589000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.586863 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 10 03:33:35.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.586899 systemd[1]: Closed systemd-udevd-control.socket. May 10 03:33:35.591000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.587731 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 10 03:33:35.587761 systemd[1]: Closed systemd-udevd-kernel.socket. May 10 03:33:35.588714 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 10 03:33:35.588753 systemd[1]: Stopped dracut-pre-udev.service. May 10 03:33:35.589746 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 10 03:33:35.589781 systemd[1]: Stopped dracut-cmdline.service. May 10 03:33:35.590673 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 10 03:33:35.590709 systemd[1]: Stopped dracut-cmdline-ask.service. May 10 03:33:35.592458 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 10 03:33:35.599741 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 10 03:33:35.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.599848 systemd[1]: Stopped systemd-vconsole-setup.service. May 10 03:33:35.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:35.601230 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 10 03:33:35.601340 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 10 03:33:35.602142 systemd[1]: Reached target initrd-switch-root.target. May 10 03:33:35.603968 systemd[1]: Starting initrd-switch-root.service... May 10 03:33:35.623692 systemd[1]: Switching root. May 10 03:33:35.650887 systemd-journald[186]: Received SIGTERM from PID 1 (systemd). May 10 03:33:35.651016 iscsid[648]: iscsid shutting down. May 10 03:33:35.652393 systemd-journald[186]: Journal stopped May 10 03:33:39.739367 kernel: SELinux: Class mctp_socket not defined in policy. May 10 03:33:39.739424 kernel: SELinux: Class anon_inode not defined in policy. May 10 03:33:39.739441 kernel: SELinux: the above unknown classes and permissions will be allowed May 10 03:33:39.739457 kernel: SELinux: policy capability network_peer_controls=1 May 10 03:33:39.739472 kernel: SELinux: policy capability open_perms=1 May 10 03:33:39.739485 kernel: SELinux: policy capability extended_socket_class=1 May 10 03:33:39.739497 kernel: SELinux: policy capability always_check_network=0 May 10 03:33:39.739509 kernel: SELinux: policy capability cgroup_seclabel=1 May 10 03:33:39.739520 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 10 03:33:39.739532 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 10 03:33:39.739543 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 10 03:33:39.739560 systemd[1]: Successfully loaded SELinux policy in 96.730ms. May 10 03:33:39.739574 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 21.561ms. May 10 03:33:39.739590 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 10 03:33:39.739606 systemd[1]: Detected virtualization kvm. May 10 03:33:39.739619 systemd[1]: Detected architecture x86-64. May 10 03:33:39.739631 systemd[1]: Detected first boot. May 10 03:33:39.739645 systemd[1]: Hostname set to . May 10 03:33:39.739660 systemd[1]: Initializing machine ID from VM UUID. May 10 03:33:39.739673 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 10 03:33:39.739685 systemd[1]: Populated /etc with preset unit settings. May 10 03:33:39.739697 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 03:33:39.739712 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 03:33:39.739726 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 03:33:39.739742 systemd[1]: iscsiuio.service: Deactivated successfully. May 10 03:33:39.739755 systemd[1]: Stopped iscsiuio.service. May 10 03:33:39.739782 systemd[1]: iscsid.service: Deactivated successfully. May 10 03:33:39.739796 systemd[1]: Stopped iscsid.service. May 10 03:33:39.739808 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 10 03:33:39.739821 systemd[1]: Stopped initrd-switch-root.service. May 10 03:33:39.739834 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 10 03:33:39.739848 systemd[1]: Created slice system-addon\x2dconfig.slice. May 10 03:33:39.739863 systemd[1]: Created slice system-addon\x2drun.slice. May 10 03:33:39.739876 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. May 10 03:33:39.739888 systemd[1]: Created slice system-getty.slice. May 10 03:33:39.739900 systemd[1]: Created slice system-modprobe.slice. May 10 03:33:39.739913 systemd[1]: Created slice system-serial\x2dgetty.slice. May 10 03:33:39.739925 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 10 03:33:39.739938 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 10 03:33:39.739951 systemd[1]: Created slice user.slice. May 10 03:33:39.739966 systemd[1]: Started systemd-ask-password-console.path. May 10 03:33:39.739979 systemd[1]: Started systemd-ask-password-wall.path. May 10 03:33:39.739992 systemd[1]: Set up automount boot.automount. May 10 03:33:39.740006 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 10 03:33:39.740019 systemd[1]: Stopped target initrd-switch-root.target. May 10 03:33:39.740032 systemd[1]: Stopped target initrd-fs.target. May 10 03:33:39.740045 systemd[1]: Stopped target initrd-root-fs.target. May 10 03:33:39.740059 systemd[1]: Reached target integritysetup.target. May 10 03:33:39.740072 systemd[1]: Reached target remote-cryptsetup.target. May 10 03:33:39.740085 systemd[1]: Reached target remote-fs.target. May 10 03:33:39.740277 systemd[1]: Reached target slices.target. May 10 03:33:39.740299 systemd[1]: Reached target swap.target. May 10 03:33:39.740312 systemd[1]: Reached target torcx.target. May 10 03:33:39.740324 systemd[1]: Reached target veritysetup.target. May 10 03:33:39.740337 systemd[1]: Listening on systemd-coredump.socket. May 10 03:33:39.740350 systemd[1]: Listening on systemd-initctl.socket. May 10 03:33:39.740365 systemd[1]: Listening on systemd-networkd.socket. May 10 03:33:39.740378 systemd[1]: Listening on systemd-udevd-control.socket. May 10 03:33:39.740390 systemd[1]: Listening on systemd-udevd-kernel.socket. May 10 03:33:39.740402 systemd[1]: Listening on systemd-userdbd.socket. May 10 03:33:39.740415 systemd[1]: Mounting dev-hugepages.mount... May 10 03:33:39.740427 systemd[1]: Mounting dev-mqueue.mount... May 10 03:33:39.740439 systemd[1]: Mounting media.mount... May 10 03:33:39.740452 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 03:33:39.740467 systemd[1]: Mounting sys-kernel-debug.mount... May 10 03:33:39.740480 systemd[1]: Mounting sys-kernel-tracing.mount... May 10 03:33:39.740494 systemd[1]: Mounting tmp.mount... May 10 03:33:39.740507 systemd[1]: Starting flatcar-tmpfiles.service... May 10 03:33:39.740519 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 03:33:39.740532 systemd[1]: Starting kmod-static-nodes.service... May 10 03:33:39.740544 systemd[1]: Starting modprobe@configfs.service... May 10 03:33:39.740557 systemd[1]: Starting modprobe@dm_mod.service... May 10 03:33:39.740570 systemd[1]: Starting modprobe@drm.service... May 10 03:33:39.740582 systemd[1]: Starting modprobe@efi_pstore.service... May 10 03:33:39.740594 systemd[1]: Starting modprobe@fuse.service... May 10 03:33:39.740608 systemd[1]: Starting modprobe@loop.service... May 10 03:33:39.740621 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 10 03:33:39.740634 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 10 03:33:39.740646 systemd[1]: Stopped systemd-fsck-root.service. May 10 03:33:39.740658 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 10 03:33:39.740670 systemd[1]: Stopped systemd-fsck-usr.service. May 10 03:33:39.740682 kernel: loop: module loaded May 10 03:33:39.740694 systemd[1]: Stopped systemd-journald.service. May 10 03:33:39.740707 systemd[1]: Starting systemd-journald.service... May 10 03:33:39.740721 kernel: fuse: init (API version 7.34) May 10 03:33:39.740734 systemd[1]: Starting systemd-modules-load.service... May 10 03:33:39.740747 systemd[1]: Starting systemd-network-generator.service... May 10 03:33:39.740760 systemd[1]: Starting systemd-remount-fs.service... May 10 03:33:39.740772 systemd[1]: Starting systemd-udev-trigger.service... May 10 03:33:39.740784 systemd[1]: verity-setup.service: Deactivated successfully. May 10 03:33:39.740797 systemd[1]: Stopped verity-setup.service. May 10 03:33:39.740809 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 03:33:39.740822 systemd[1]: Mounted dev-hugepages.mount. May 10 03:33:39.740836 systemd[1]: Mounted dev-mqueue.mount. May 10 03:33:39.740848 systemd[1]: Mounted media.mount. May 10 03:33:39.740860 systemd[1]: Mounted sys-kernel-debug.mount. May 10 03:33:39.740873 systemd[1]: Mounted sys-kernel-tracing.mount. May 10 03:33:39.740885 systemd[1]: Mounted tmp.mount. May 10 03:33:39.740897 systemd[1]: Finished kmod-static-nodes.service. May 10 03:33:39.740912 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 10 03:33:39.740928 systemd-journald[943]: Journal started May 10 03:33:39.740976 systemd-journald[943]: Runtime Journal (/run/log/journal/46d0021e7eab48a8b784fbaa0c26de4c) is 8.0M, max 78.4M, 70.4M free. May 10 03:33:35.943000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 10 03:33:36.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 03:33:36.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 10 03:33:36.078000 audit: BPF prog-id=10 op=LOAD May 10 03:33:36.078000 audit: BPF prog-id=10 op=UNLOAD May 10 03:33:36.078000 audit: BPF prog-id=11 op=LOAD May 10 03:33:36.078000 audit: BPF prog-id=11 op=UNLOAD May 10 03:33:36.216000 audit[859]: AVC avc: denied { associate } for pid=859 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 10 03:33:36.216000 audit[859]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001178c2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=842 pid=859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:33:36.216000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 03:33:36.219000 audit[859]: AVC avc: denied { associate } for pid=859 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 10 03:33:36.219000 audit[859]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000117999 a2=1ed a3=0 items=2 ppid=842 pid=859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:33:36.219000 audit: CWD cwd="/" May 10 03:33:36.219000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:36.219000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:36.219000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 10 03:33:39.500000 audit: BPF prog-id=12 op=LOAD May 10 03:33:39.500000 audit: BPF prog-id=3 op=UNLOAD May 10 03:33:39.500000 audit: BPF prog-id=13 op=LOAD May 10 03:33:39.501000 audit: BPF prog-id=14 op=LOAD May 10 03:33:39.501000 audit: BPF prog-id=4 op=UNLOAD May 10 03:33:39.501000 audit: BPF prog-id=5 op=UNLOAD May 10 03:33:39.502000 audit: BPF prog-id=15 op=LOAD May 10 03:33:39.502000 audit: BPF prog-id=12 op=UNLOAD May 10 03:33:39.502000 audit: BPF prog-id=16 op=LOAD May 10 03:33:39.502000 audit: BPF prog-id=17 op=LOAD May 10 03:33:39.502000 audit: BPF prog-id=13 op=UNLOAD May 10 03:33:39.502000 audit: BPF prog-id=14 op=UNLOAD May 10 03:33:39.503000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.507000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.513000 audit: BPF prog-id=15 op=UNLOAD May 10 03:33:39.515000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.515000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.686000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.686000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.687000 audit: BPF prog-id=18 op=LOAD May 10 03:33:39.687000 audit: BPF prog-id=19 op=LOAD May 10 03:33:39.687000 audit: BPF prog-id=20 op=LOAD May 10 03:33:39.687000 audit: BPF prog-id=16 op=UNLOAD May 10 03:33:39.687000 audit: BPF prog-id=17 op=UNLOAD May 10 03:33:39.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.738000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 10 03:33:39.738000 audit[943]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd5a9a5290 a2=4000 a3=7ffd5a9a532c items=0 ppid=1 pid=943 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:33:39.738000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 10 03:33:39.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:36.210465 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 03:33:39.499220 systemd[1]: Queued start job for default target multi-user.target. May 10 03:33:39.745160 systemd[1]: Finished modprobe@configfs.service. May 10 03:33:36.211392 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 03:33:39.499232 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 10 03:33:39.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:36.211415 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 03:33:39.503726 systemd[1]: systemd-journald.service: Deactivated successfully. May 10 03:33:36.211457 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 10 03:33:36.211470 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="skipped missing lower profile" missing profile=oem May 10 03:33:36.211507 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 10 03:33:36.211523 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 10 03:33:36.211798 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 10 03:33:36.211849 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 10 03:33:36.211866 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 10 03:33:36.214177 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 10 03:33:36.214222 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 10 03:33:36.214247 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.7: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.7 May 10 03:33:36.214267 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 10 03:33:36.214292 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.7: no such file or directory" path=/var/lib/torcx/store/3510.3.7 May 10 03:33:36.214310 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:36Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 10 03:33:39.016994 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:39Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 03:33:39.017305 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:39Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 03:33:39.017426 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:39Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 03:33:39.017620 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:39Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 10 03:33:39.017681 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:39Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 10 03:33:39.017752 /usr/lib/systemd/system-generators/torcx-generator[859]: time="2025-05-10T03:33:39Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 10 03:33:39.750180 systemd[1]: Started systemd-journald.service. May 10 03:33:39.749000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.751254 systemd[1]: Finished flatcar-tmpfiles.service. May 10 03:33:39.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.752577 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 03:33:39.752766 systemd[1]: Finished modprobe@dm_mod.service. May 10 03:33:39.753000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.753526 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 03:33:39.753682 systemd[1]: Finished modprobe@drm.service. May 10 03:33:39.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.754491 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 03:33:39.754633 systemd[1]: Finished modprobe@efi_pstore.service. May 10 03:33:39.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.755373 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 10 03:33:39.755531 systemd[1]: Finished modprobe@fuse.service. May 10 03:33:39.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.756228 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 03:33:39.756349 systemd[1]: Finished modprobe@loop.service. May 10 03:33:39.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.757249 systemd[1]: Finished systemd-modules-load.service. May 10 03:33:39.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.758011 systemd[1]: Finished systemd-network-generator.service. May 10 03:33:39.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.758765 systemd[1]: Finished systemd-remount-fs.service. May 10 03:33:39.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.759862 systemd[1]: Reached target network-pre.target. May 10 03:33:39.761616 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 10 03:33:39.763634 systemd[1]: Mounting sys-kernel-config.mount... May 10 03:33:39.766860 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 10 03:33:39.769022 systemd[1]: Starting systemd-hwdb-update.service... May 10 03:33:39.771463 systemd[1]: Starting systemd-journal-flush.service... May 10 03:33:39.774261 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 03:33:39.778276 systemd[1]: Starting systemd-random-seed.service... May 10 03:33:39.778480 systemd-journald[943]: Time spent on flushing to /var/log/journal/46d0021e7eab48a8b784fbaa0c26de4c is 44.884ms for 1095 entries. May 10 03:33:39.778480 systemd-journald[943]: System Journal (/var/log/journal/46d0021e7eab48a8b784fbaa0c26de4c) is 8.0M, max 584.8M, 576.8M free. May 10 03:33:39.834988 systemd-journald[943]: Received client request to flush runtime journal. May 10 03:33:39.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.781348 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 03:33:39.783722 systemd[1]: Starting systemd-sysctl.service... May 10 03:33:39.786525 systemd[1]: Starting systemd-sysusers.service... May 10 03:33:39.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.791280 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 10 03:33:39.792381 systemd[1]: Mounted sys-kernel-config.mount. May 10 03:33:39.837142 udevadm[968]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 10 03:33:39.809721 systemd[1]: Finished systemd-udev-trigger.service. May 10 03:33:39.811630 systemd[1]: Starting systemd-udev-settle.service... May 10 03:33:39.813812 systemd[1]: Finished systemd-random-seed.service. May 10 03:33:39.814469 systemd[1]: Reached target first-boot-complete.target. May 10 03:33:39.822964 systemd[1]: Finished systemd-sysctl.service. May 10 03:33:39.835965 systemd[1]: Finished systemd-journal-flush.service. May 10 03:33:39.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:39.843043 systemd[1]: Finished systemd-sysusers.service. May 10 03:33:40.418172 systemd[1]: Finished systemd-hwdb-update.service. May 10 03:33:40.419000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.435582 kernel: kauditd_printk_skb: 100 callbacks suppressed May 10 03:33:40.435626 kernel: audit: type=1130 audit(1746848020.419:140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.435647 kernel: audit: type=1334 audit(1746848020.422:141): prog-id=21 op=LOAD May 10 03:33:40.422000 audit: BPF prog-id=21 op=LOAD May 10 03:33:40.439000 audit: BPF prog-id=22 op=LOAD May 10 03:33:40.443749 kernel: audit: type=1334 audit(1746848020.439:142): prog-id=22 op=LOAD May 10 03:33:40.443800 kernel: audit: type=1334 audit(1746848020.439:143): prog-id=7 op=UNLOAD May 10 03:33:40.439000 audit: BPF prog-id=7 op=UNLOAD May 10 03:33:40.444013 systemd[1]: Starting systemd-udevd.service... May 10 03:33:40.448215 kernel: audit: type=1334 audit(1746848020.439:144): prog-id=8 op=UNLOAD May 10 03:33:40.439000 audit: BPF prog-id=8 op=UNLOAD May 10 03:33:40.467584 systemd-udevd[970]: Using default interface naming scheme 'v252'. May 10 03:33:40.516305 systemd[1]: Started systemd-udevd.service. May 10 03:33:40.520000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.534140 kernel: audit: type=1130 audit(1746848020.520:145): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.536934 systemd[1]: Starting systemd-networkd.service... May 10 03:33:40.535000 audit: BPF prog-id=23 op=LOAD May 10 03:33:40.549164 kernel: audit: type=1334 audit(1746848020.535:146): prog-id=23 op=LOAD May 10 03:33:40.552517 systemd[1]: Starting systemd-userdbd.service... May 10 03:33:40.550000 audit: BPF prog-id=24 op=LOAD May 10 03:33:40.575170 kernel: audit: type=1334 audit(1746848020.550:147): prog-id=24 op=LOAD May 10 03:33:40.588222 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 10 03:33:40.550000 audit: BPF prog-id=25 op=LOAD May 10 03:33:40.592179 kernel: audit: type=1334 audit(1746848020.550:148): prog-id=25 op=LOAD May 10 03:33:40.551000 audit: BPF prog-id=26 op=LOAD May 10 03:33:40.595126 kernel: audit: type=1334 audit(1746848020.551:149): prog-id=26 op=LOAD May 10 03:33:40.629696 systemd[1]: Started systemd-userdbd.service. May 10 03:33:40.630000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.649422 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 10 03:33:40.661000 audit[977]: AVC avc: denied { confidentiality } for pid=977 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 10 03:33:40.661000 audit[977]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=555a06ad0070 a1=338ac a2=7f6aa7562bc5 a3=5 items=110 ppid=970 pid=977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:33:40.661000 audit: CWD cwd="/" May 10 03:33:40.661000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=1 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=2 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=3 name=(null) inode=13557 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=4 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=5 name=(null) inode=13558 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=6 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=7 name=(null) inode=13559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=8 name=(null) inode=13559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=9 name=(null) inode=13560 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=10 name=(null) inode=13559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=11 name=(null) inode=13561 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=12 name=(null) inode=13559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=13 name=(null) inode=13562 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=14 name=(null) inode=13559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=15 name=(null) inode=13563 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=16 name=(null) inode=13559 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=17 name=(null) inode=13564 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=18 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=19 name=(null) inode=13565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=20 name=(null) inode=13565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=21 name=(null) inode=13566 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=22 name=(null) inode=13565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=23 name=(null) inode=13567 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=24 name=(null) inode=13565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=25 name=(null) inode=13568 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=26 name=(null) inode=13565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=27 name=(null) inode=13569 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=28 name=(null) inode=13565 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=29 name=(null) inode=13570 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=30 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=31 name=(null) inode=13571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=32 name=(null) inode=13571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=33 name=(null) inode=13572 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=34 name=(null) inode=13571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=35 name=(null) inode=13573 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=36 name=(null) inode=13571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=37 name=(null) inode=13574 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=38 name=(null) inode=13571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=39 name=(null) inode=13575 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=40 name=(null) inode=13571 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=41 name=(null) inode=13576 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=42 name=(null) inode=13556 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=43 name=(null) inode=13577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=44 name=(null) inode=13577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=45 name=(null) inode=13578 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=46 name=(null) inode=13577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=47 name=(null) inode=13579 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=48 name=(null) inode=13577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=49 name=(null) inode=13580 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=50 name=(null) inode=13577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=51 name=(null) inode=13581 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=52 name=(null) inode=13577 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=53 name=(null) inode=13582 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=55 name=(null) inode=13583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=56 name=(null) inode=13583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=57 name=(null) inode=13584 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=58 name=(null) inode=13583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=59 name=(null) inode=13585 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=60 name=(null) inode=13583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=61 name=(null) inode=13586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=62 name=(null) inode=13586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=63 name=(null) inode=13587 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=64 name=(null) inode=13586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=65 name=(null) inode=13588 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=66 name=(null) inode=13586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=67 name=(null) inode=13589 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=68 name=(null) inode=13586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=69 name=(null) inode=13590 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=70 name=(null) inode=13586 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=71 name=(null) inode=13591 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=72 name=(null) inode=13583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=73 name=(null) inode=13592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=74 name=(null) inode=13592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=75 name=(null) inode=13593 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=76 name=(null) inode=13592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=77 name=(null) inode=13594 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=78 name=(null) inode=13592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=79 name=(null) inode=13595 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=80 name=(null) inode=13592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=81 name=(null) inode=13596 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=82 name=(null) inode=13592 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=83 name=(null) inode=13597 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=84 name=(null) inode=13583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=85 name=(null) inode=13598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=86 name=(null) inode=13598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=87 name=(null) inode=13599 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=88 name=(null) inode=13598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=89 name=(null) inode=13600 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=90 name=(null) inode=13598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=91 name=(null) inode=13601 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=92 name=(null) inode=13598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=93 name=(null) inode=13602 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=94 name=(null) inode=13598 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=95 name=(null) inode=13603 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=96 name=(null) inode=13583 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=97 name=(null) inode=13604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=98 name=(null) inode=13604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=99 name=(null) inode=13605 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=100 name=(null) inode=13604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=101 name=(null) inode=13606 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=102 name=(null) inode=13604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=103 name=(null) inode=13607 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=104 name=(null) inode=13604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=105 name=(null) inode=13608 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=106 name=(null) inode=13604 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=107 name=(null) inode=13609 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PATH item=109 name=(null) inode=13610 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:33:40.661000 audit: PROCTITLE proctitle="(udev-worker)" May 10 03:33:40.679143 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 May 10 03:33:40.727315 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 10 03:33:40.735169 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 10 03:33:40.737235 kernel: ACPI: button: Power Button [PWRF] May 10 03:33:40.738993 systemd-networkd[991]: lo: Link UP May 10 03:33:40.739003 systemd-networkd[991]: lo: Gained carrier May 10 03:33:40.739463 systemd-networkd[991]: Enumeration completed May 10 03:33:40.739757 systemd-networkd[991]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 10 03:33:40.739890 systemd[1]: Started systemd-networkd.service. May 10 03:33:40.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.741788 systemd-networkd[991]: eth0: Link UP May 10 03:33:40.741796 systemd-networkd[991]: eth0: Gained carrier May 10 03:33:40.748124 kernel: mousedev: PS/2 mouse device common for all mice May 10 03:33:40.752250 systemd-networkd[991]: eth0: DHCPv4 address 172.24.4.212/24, gateway 172.24.4.1 acquired from 172.24.4.1 May 10 03:33:40.798456 systemd[1]: Finished systemd-udev-settle.service. May 10 03:33:40.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.800355 systemd[1]: Starting lvm2-activation-early.service... May 10 03:33:40.838864 lvm[1004]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 03:33:40.884192 systemd[1]: Finished lvm2-activation-early.service. May 10 03:33:40.885000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.885725 systemd[1]: Reached target cryptsetup.target. May 10 03:33:40.889287 systemd[1]: Starting lvm2-activation.service... May 10 03:33:40.898261 lvm[1005]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 10 03:33:40.937977 systemd[1]: Finished lvm2-activation.service. May 10 03:33:40.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:40.939723 systemd[1]: Reached target local-fs-pre.target. May 10 03:33:40.940953 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 10 03:33:40.941018 systemd[1]: Reached target local-fs.target. May 10 03:33:40.942313 systemd[1]: Reached target machines.target. May 10 03:33:40.946020 systemd[1]: Starting ldconfig.service... May 10 03:33:40.948731 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 03:33:40.948836 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 03:33:40.951026 systemd[1]: Starting systemd-boot-update.service... May 10 03:33:40.954362 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 10 03:33:40.963418 systemd[1]: Starting systemd-machine-id-commit.service... May 10 03:33:40.969496 systemd[1]: Starting systemd-sysext.service... May 10 03:33:40.988777 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1007 (bootctl) May 10 03:33:40.991429 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 10 03:33:41.009870 systemd[1]: Unmounting usr-share-oem.mount... May 10 03:33:41.012650 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 10 03:33:41.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.029476 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 10 03:33:41.029643 systemd[1]: Unmounted usr-share-oem.mount. May 10 03:33:41.110182 kernel: loop0: detected capacity change from 0 to 210664 May 10 03:33:41.339178 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 10 03:33:41.340507 systemd[1]: Finished systemd-machine-id-commit.service. May 10 03:33:41.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.394146 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 10 03:33:41.424390 kernel: loop1: detected capacity change from 0 to 210664 May 10 03:33:41.473345 (sd-sysext)[1020]: Using extensions 'kubernetes'. May 10 03:33:41.474634 (sd-sysext)[1020]: Merged extensions into '/usr'. May 10 03:33:41.524172 systemd-fsck[1017]: fsck.fat 4.2 (2021-01-31) May 10 03:33:41.524172 systemd-fsck[1017]: /dev/vda1: 790 files, 120688/258078 clusters May 10 03:33:41.526286 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 10 03:33:41.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.529715 systemd[1]: Mounting boot.mount... May 10 03:33:41.532775 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 03:33:41.534381 systemd[1]: Mounting usr-share-oem.mount... May 10 03:33:41.537379 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 03:33:41.538726 systemd[1]: Starting modprobe@dm_mod.service... May 10 03:33:41.541259 systemd[1]: Starting modprobe@efi_pstore.service... May 10 03:33:41.544086 systemd[1]: Starting modprobe@loop.service... May 10 03:33:41.544719 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 03:33:41.544844 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 03:33:41.544981 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 03:33:41.547753 systemd[1]: Mounted usr-share-oem.mount. May 10 03:33:41.548622 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 03:33:41.548795 systemd[1]: Finished modprobe@dm_mod.service. May 10 03:33:41.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.549651 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 03:33:41.549767 systemd[1]: Finished modprobe@efi_pstore.service. May 10 03:33:41.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.550657 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 03:33:41.551202 systemd[1]: Finished modprobe@loop.service. May 10 03:33:41.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.553767 systemd[1]: Mounted boot.mount. May 10 03:33:41.560000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.560307 systemd[1]: Finished systemd-sysext.service. May 10 03:33:41.563075 systemd[1]: Starting ensure-sysext.service... May 10 03:33:41.564093 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 03:33:41.564191 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 03:33:41.565345 systemd[1]: Starting systemd-tmpfiles-setup.service... May 10 03:33:41.571742 systemd[1]: Reloading. May 10 03:33:41.603335 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 10 03:33:41.616227 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 10 03:33:41.632267 systemd-tmpfiles[1028]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 10 03:33:41.668283 /usr/lib/systemd/system-generators/torcx-generator[1047]: time="2025-05-10T03:33:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 03:33:41.668314 /usr/lib/systemd/system-generators/torcx-generator[1047]: time="2025-05-10T03:33:41Z" level=info msg="torcx already run" May 10 03:33:41.770285 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 03:33:41.770307 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 03:33:41.797359 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 03:33:41.863000 audit: BPF prog-id=27 op=LOAD May 10 03:33:41.863000 audit: BPF prog-id=18 op=UNLOAD May 10 03:33:41.863000 audit: BPF prog-id=28 op=LOAD May 10 03:33:41.863000 audit: BPF prog-id=29 op=LOAD May 10 03:33:41.863000 audit: BPF prog-id=19 op=UNLOAD May 10 03:33:41.863000 audit: BPF prog-id=20 op=UNLOAD May 10 03:33:41.863000 audit: BPF prog-id=30 op=LOAD May 10 03:33:41.863000 audit: BPF prog-id=31 op=LOAD May 10 03:33:41.863000 audit: BPF prog-id=21 op=UNLOAD May 10 03:33:41.863000 audit: BPF prog-id=22 op=UNLOAD May 10 03:33:41.865000 audit: BPF prog-id=32 op=LOAD May 10 03:33:41.865000 audit: BPF prog-id=24 op=UNLOAD May 10 03:33:41.865000 audit: BPF prog-id=33 op=LOAD May 10 03:33:41.865000 audit: BPF prog-id=34 op=LOAD May 10 03:33:41.865000 audit: BPF prog-id=25 op=UNLOAD May 10 03:33:41.865000 audit: BPF prog-id=26 op=UNLOAD May 10 03:33:41.868000 audit: BPF prog-id=35 op=LOAD May 10 03:33:41.868000 audit: BPF prog-id=23 op=UNLOAD May 10 03:33:41.871673 systemd[1]: Finished systemd-boot-update.service. May 10 03:33:41.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.890481 systemd[1]: Finished systemd-tmpfiles-setup.service. May 10 03:33:41.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.892738 systemd[1]: Finished ensure-sysext.service. May 10 03:33:41.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.895782 systemd[1]: Starting audit-rules.service... May 10 03:33:41.899847 systemd[1]: Starting clean-ca-certificates.service... May 10 03:33:41.901068 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 10 03:33:41.903083 systemd[1]: Starting modprobe@dm_mod.service... May 10 03:33:41.906535 systemd[1]: Starting modprobe@drm.service... May 10 03:33:41.910930 systemd[1]: Starting modprobe@efi_pstore.service... May 10 03:33:41.914908 systemd[1]: Starting modprobe@loop.service... May 10 03:33:41.915840 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 10 03:33:41.915929 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 03:33:41.919388 systemd[1]: Starting systemd-journal-catalog-update.service... May 10 03:33:41.924976 systemd[1]: Starting systemd-networkd-wait-online.service... May 10 03:33:41.928000 audit: BPF prog-id=36 op=LOAD May 10 03:33:41.929688 systemd[1]: Starting systemd-resolved.service... May 10 03:33:41.931000 audit: BPF prog-id=37 op=LOAD May 10 03:33:41.934369 systemd[1]: Starting systemd-timesyncd.service... May 10 03:33:41.938453 systemd[1]: Starting systemd-update-utmp.service... May 10 03:33:41.940670 systemd[1]: Finished clean-ca-certificates.service. May 10 03:33:41.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.941497 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 10 03:33:41.941635 systemd[1]: Finished modprobe@dm_mod.service. May 10 03:33:41.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.941000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.942325 systemd[1]: modprobe@drm.service: Deactivated successfully. May 10 03:33:41.942445 systemd[1]: Finished modprobe@drm.service. May 10 03:33:41.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.942000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.943090 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 10 03:33:41.944376 systemd[1]: Finished modprobe@efi_pstore.service. May 10 03:33:41.944000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.944000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.945283 systemd[1]: modprobe@loop.service: Deactivated successfully. May 10 03:33:41.945412 systemd[1]: Finished modprobe@loop.service. May 10 03:33:41.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.946373 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 10 03:33:41.946417 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 10 03:33:41.946440 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 10 03:33:41.959000 audit[1111]: SYSTEM_BOOT pid=1111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 10 03:33:41.960748 systemd[1]: Finished systemd-update-utmp.service. May 10 03:33:41.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:41.973141 systemd[1]: Finished systemd-journal-catalog-update.service. May 10 03:33:41.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:33:42.006000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 10 03:33:42.006000 audit[1120]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe8baf8e80 a2=420 a3=0 items=0 ppid=1095 pid=1120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:33:42.006000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 10 03:33:42.007495 augenrules[1120]: No rules May 10 03:33:42.008032 systemd[1]: Finished audit-rules.service. May 10 03:33:42.023328 ldconfig[1006]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 10 03:33:42.030236 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 03:33:42.030259 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 10 03:33:42.031468 systemd-resolved[1109]: Positive Trust Anchors: May 10 03:33:42.031484 systemd-resolved[1109]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 10 03:33:42.031521 systemd-resolved[1109]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 10 03:33:42.048594 systemd[1]: Started systemd-timesyncd.service. May 10 03:33:42.049252 systemd[1]: Reached target time-set.target. May 10 03:33:42.049306 systemd-resolved[1109]: Using system hostname 'ci-3510-3-7-n-13802d7031.novalocal'. May 10 03:33:42.050000 systemd[1]: Finished ldconfig.service. May 10 03:33:42.051809 systemd[1]: Starting systemd-update-done.service... May 10 03:33:42.052432 systemd[1]: Started systemd-resolved.service. May 10 03:33:42.053069 systemd[1]: Reached target network.target. May 10 03:33:42.053602 systemd[1]: Reached target nss-lookup.target. May 10 03:33:42.059348 systemd[1]: Finished systemd-update-done.service. May 10 03:33:42.059927 systemd[1]: Reached target sysinit.target. May 10 03:33:42.060586 systemd[1]: Started motdgen.path. May 10 03:33:42.061060 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 10 03:33:42.061737 systemd[1]: Started logrotate.timer. May 10 03:33:42.062300 systemd[1]: Started mdadm.timer. May 10 03:33:42.062722 systemd[1]: Started systemd-tmpfiles-clean.timer. May 10 03:33:42.063202 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 10 03:33:42.063235 systemd[1]: Reached target paths.target. May 10 03:33:42.063668 systemd[1]: Reached target timers.target. May 10 03:33:42.064491 systemd[1]: Listening on dbus.socket. May 10 03:33:42.065943 systemd[1]: Starting docker.socket... May 10 03:33:42.069756 systemd[1]: Listening on sshd.socket. May 10 03:33:42.070455 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 03:33:42.070984 systemd[1]: Listening on docker.socket. May 10 03:33:42.071579 systemd[1]: Reached target sockets.target. May 10 03:33:42.072126 systemd[1]: Reached target basic.target. May 10 03:33:42.072670 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 03:33:42.072774 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 10 03:33:42.073891 systemd[1]: Starting containerd.service... May 10 03:33:42.075819 systemd[1]: Starting coreos-metadata-sshkeys@core.service... May 10 03:33:42.078718 systemd[1]: Starting dbus.service... May 10 03:33:42.528494 systemd-resolved[1109]: Clock change detected. Flushing caches. May 10 03:33:42.528672 systemd-timesyncd[1110]: Contacted time server 129.250.35.251:123 (0.flatcar.pool.ntp.org). May 10 03:33:42.528916 systemd-timesyncd[1110]: Initial clock synchronization to Sat 2025-05-10 03:33:42.528469 UTC. May 10 03:33:42.529741 systemd[1]: Starting enable-oem-cloudinit.service... May 10 03:33:42.535909 systemd[1]: Starting extend-filesystems.service... May 10 03:33:42.537612 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 10 03:33:42.541657 jq[1134]: false May 10 03:33:42.541792 systemd[1]: Starting motdgen.service... May 10 03:33:42.545777 systemd[1]: Starting prepare-helm.service... May 10 03:33:42.547544 systemd[1]: Starting ssh-key-proc-cmdline.service... May 10 03:33:42.549157 systemd[1]: Starting sshd-keygen.service... May 10 03:33:42.553932 systemd[1]: Starting systemd-logind.service... May 10 03:33:42.554467 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 10 03:33:42.554536 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 10 03:33:42.554960 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 10 03:33:42.555622 systemd[1]: Starting update-engine.service... May 10 03:33:42.557541 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 10 03:33:42.562832 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 10 03:33:42.563033 systemd[1]: Finished ssh-key-proc-cmdline.service. May 10 03:33:42.581070 jq[1145]: true May 10 03:33:42.581718 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 10 03:33:42.581898 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 10 03:33:42.586807 tar[1149]: linux-amd64/helm May 10 03:33:42.612543 systemd[1]: motdgen.service: Deactivated successfully. May 10 03:33:42.612732 systemd[1]: Finished motdgen.service. May 10 03:33:42.621233 jq[1153]: true May 10 03:33:42.624948 extend-filesystems[1135]: Found loop1 May 10 03:33:42.624948 extend-filesystems[1135]: Found vda May 10 03:33:42.624948 extend-filesystems[1135]: Found vda1 May 10 03:33:42.624948 extend-filesystems[1135]: Found vda2 May 10 03:33:42.624948 extend-filesystems[1135]: Found vda3 May 10 03:33:42.624948 extend-filesystems[1135]: Found usr May 10 03:33:42.624948 extend-filesystems[1135]: Found vda4 May 10 03:33:42.624948 extend-filesystems[1135]: Found vda6 May 10 03:33:42.624948 extend-filesystems[1135]: Found vda7 May 10 03:33:42.624948 extend-filesystems[1135]: Found vda9 May 10 03:33:42.624948 extend-filesystems[1135]: Checking size of /dev/vda9 May 10 03:33:42.648763 dbus-daemon[1131]: [system] SELinux support is enabled May 10 03:33:42.650477 extend-filesystems[1135]: Resized partition /dev/vda9 May 10 03:33:42.648901 systemd[1]: Started dbus.service. May 10 03:33:42.651506 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 10 03:33:42.651529 systemd[1]: Reached target system-config.target. May 10 03:33:42.652036 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 10 03:33:42.652052 systemd[1]: Reached target user-config.target. May 10 03:33:42.659232 extend-filesystems[1176]: resize2fs 1.46.5 (30-Dec-2021) May 10 03:33:42.687782 env[1150]: time="2025-05-10T03:33:42.687737075Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 10 03:33:42.703290 kernel: EXT4-fs (vda9): resizing filesystem from 1617920 to 2014203 blocks May 10 03:33:42.706288 kernel: EXT4-fs (vda9): resized filesystem to 2014203 May 10 03:33:42.745944 env[1150]: time="2025-05-10T03:33:42.745901742Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 10 03:33:42.754658 systemd-logind[1143]: Watching system buttons on /dev/input/event1 (Power Button) May 10 03:33:42.754679 systemd-logind[1143]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 10 03:33:42.758836 extend-filesystems[1176]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 10 03:33:42.758836 extend-filesystems[1176]: old_desc_blocks = 1, new_desc_blocks = 1 May 10 03:33:42.758836 extend-filesystems[1176]: The filesystem on /dev/vda9 is now 2014203 (4k) blocks long. May 10 03:33:42.769773 extend-filesystems[1135]: Resized filesystem in /dev/vda9 May 10 03:33:42.759118 systemd[1]: extend-filesystems.service: Deactivated successfully. May 10 03:33:42.759488 systemd[1]: Finished extend-filesystems.service. May 10 03:33:42.760572 systemd-logind[1143]: New seat seat0. May 10 03:33:42.774048 env[1150]: time="2025-05-10T03:33:42.773996945Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 10 03:33:42.774843 systemd[1]: Started systemd-logind.service. May 10 03:33:42.775800 update_engine[1144]: I0510 03:33:42.769313 1144 main.cc:92] Flatcar Update Engine starting May 10 03:33:42.778320 env[1150]: time="2025-05-10T03:33:42.777383957Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.181-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 10 03:33:42.778320 env[1150]: time="2025-05-10T03:33:42.777420696Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780351052Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780376329Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780393151Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780407227Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780495683Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780742917Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780862241Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780880054Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780929266Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 10 03:33:42.781043 env[1150]: time="2025-05-10T03:33:42.780943653Z" level=info msg="metadata content store policy set" policy=shared May 10 03:33:42.784443 systemd[1]: Started update-engine.service. May 10 03:33:42.787899 update_engine[1144]: I0510 03:33:42.784500 1144 update_check_scheduler.cc:74] Next update check in 9m3s May 10 03:33:42.786959 systemd[1]: Started locksmithd.service. May 10 03:33:42.790242 bash[1185]: Updated "/home/core/.ssh/authorized_keys" May 10 03:33:42.789551 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798010112Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798054244Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798071787Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798109258Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798125668Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798141348Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798157408Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798172917Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798188186Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798205819Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798220186Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798234613Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798365378Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 10 03:33:42.799963 env[1150]: time="2025-05-10T03:33:42.798452101Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798738698Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798767402Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798783191Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798830550Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798845358Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798864033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798878290Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798892326Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798906924Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798920218Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798934054Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.798950986Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.799080830Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.799099234Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800365 env[1150]: time="2025-05-10T03:33:42.799113491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800677 env[1150]: time="2025-05-10T03:33:42.799127557Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 10 03:33:42.800677 env[1150]: time="2025-05-10T03:33:42.799145040Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 10 03:33:42.800677 env[1150]: time="2025-05-10T03:33:42.799158906Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 10 03:33:42.800677 env[1150]: time="2025-05-10T03:33:42.799180146Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 10 03:33:42.800677 env[1150]: time="2025-05-10T03:33:42.799221143Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 10 03:33:42.800794 env[1150]: time="2025-05-10T03:33:42.799457897Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 10 03:33:42.800794 env[1150]: time="2025-05-10T03:33:42.799528760Z" level=info msg="Connect containerd service" May 10 03:33:42.800794 env[1150]: time="2025-05-10T03:33:42.799567312Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 10 03:33:42.804512 env[1150]: time="2025-05-10T03:33:42.801113712Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 03:33:42.804512 env[1150]: time="2025-05-10T03:33:42.801363020Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 10 03:33:42.804512 env[1150]: time="2025-05-10T03:33:42.801404027Z" level=info msg=serving... address=/run/containerd/containerd.sock May 10 03:33:42.801507 systemd[1]: Started containerd.service. May 10 03:33:42.807502 env[1150]: time="2025-05-10T03:33:42.807458843Z" level=info msg="Start subscribing containerd event" May 10 03:33:42.807633 env[1150]: time="2025-05-10T03:33:42.807617570Z" level=info msg="Start recovering state" May 10 03:33:42.807811 env[1150]: time="2025-05-10T03:33:42.807796266Z" level=info msg="Start event monitor" May 10 03:33:42.807894 env[1150]: time="2025-05-10T03:33:42.807875484Z" level=info msg="Start snapshots syncer" May 10 03:33:42.807991 env[1150]: time="2025-05-10T03:33:42.807976423Z" level=info msg="Start cni network conf syncer for default" May 10 03:33:42.808092 env[1150]: time="2025-05-10T03:33:42.808070089Z" level=info msg="Start streaming server" May 10 03:33:42.810894 env[1150]: time="2025-05-10T03:33:42.810875901Z" level=info msg="containerd successfully booted in 0.123846s" May 10 03:33:42.825517 systemd-networkd[991]: eth0: Gained IPv6LL May 10 03:33:42.827369 systemd[1]: Finished systemd-networkd-wait-online.service. May 10 03:33:42.828301 systemd[1]: Reached target network-online.target. May 10 03:33:42.830823 systemd[1]: Starting kubelet.service... May 10 03:33:42.886789 systemd[1]: Created slice system-sshd.slice. May 10 03:33:43.546496 tar[1149]: linux-amd64/LICENSE May 10 03:33:43.546681 tar[1149]: linux-amd64/README.md May 10 03:33:43.556046 systemd[1]: Finished prepare-helm.service. May 10 03:33:43.618249 locksmithd[1192]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 10 03:33:44.226374 sshd_keygen[1160]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 10 03:33:44.266012 systemd[1]: Finished sshd-keygen.service. May 10 03:33:44.268405 systemd[1]: Starting issuegen.service... May 10 03:33:44.270129 systemd[1]: Started sshd@0-172.24.4.212:22-172.24.4.1:38916.service. May 10 03:33:44.277359 systemd[1]: issuegen.service: Deactivated successfully. May 10 03:33:44.277528 systemd[1]: Finished issuegen.service. May 10 03:33:44.280151 systemd[1]: Starting systemd-user-sessions.service... May 10 03:33:44.288491 systemd[1]: Finished systemd-user-sessions.service. May 10 03:33:44.291649 systemd[1]: Started getty@tty1.service. May 10 03:33:44.294188 systemd[1]: Started serial-getty@ttyS0.service. May 10 03:33:44.295371 systemd[1]: Reached target getty.target. May 10 03:33:44.364730 systemd[1]: Started kubelet.service. May 10 03:33:45.328124 sshd[1210]: Accepted publickey for core from 172.24.4.1 port 38916 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:33:45.332671 sshd[1210]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:33:45.364138 systemd-logind[1143]: New session 1 of user core. May 10 03:33:45.367888 systemd[1]: Created slice user-500.slice. May 10 03:33:45.371259 systemd[1]: Starting user-runtime-dir@500.service... May 10 03:33:45.395323 systemd[1]: Finished user-runtime-dir@500.service. May 10 03:33:45.401455 systemd[1]: Starting user@500.service... May 10 03:33:45.405551 (systemd)[1226]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 10 03:33:45.556490 systemd[1226]: Queued start job for default target default.target. May 10 03:33:45.557388 systemd[1226]: Reached target paths.target. May 10 03:33:45.557508 systemd[1226]: Reached target sockets.target. May 10 03:33:45.557595 systemd[1226]: Reached target timers.target. May 10 03:33:45.557700 systemd[1226]: Reached target basic.target. May 10 03:33:45.557893 systemd[1]: Started user@500.service. May 10 03:33:45.559327 systemd[1]: Started session-1.scope. May 10 03:33:45.560493 systemd[1226]: Reached target default.target. May 10 03:33:45.560775 systemd[1226]: Startup finished in 146ms. May 10 03:33:45.881553 kubelet[1219]: E0510 03:33:45.881483 1219 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 03:33:45.888630 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 03:33:45.888920 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 03:33:45.889459 systemd[1]: kubelet.service: Consumed 1.694s CPU time. May 10 03:33:46.039562 systemd[1]: Started sshd@1-172.24.4.212:22-172.24.4.1:53790.service. May 10 03:33:47.877128 sshd[1236]: Accepted publickey for core from 172.24.4.1 port 53790 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:33:47.880694 sshd[1236]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:33:47.890613 systemd-logind[1143]: New session 2 of user core. May 10 03:33:47.891570 systemd[1]: Started session-2.scope. May 10 03:33:48.522331 sshd[1236]: pam_unix(sshd:session): session closed for user core May 10 03:33:48.527326 systemd[1]: Started sshd@2-172.24.4.212:22-172.24.4.1:53804.service. May 10 03:33:48.532579 systemd[1]: sshd@1-172.24.4.212:22-172.24.4.1:53790.service: Deactivated successfully. May 10 03:33:48.534236 systemd[1]: session-2.scope: Deactivated successfully. May 10 03:33:48.538183 systemd-logind[1143]: Session 2 logged out. Waiting for processes to exit. May 10 03:33:48.542082 systemd-logind[1143]: Removed session 2. May 10 03:33:49.638899 coreos-metadata[1130]: May 10 03:33:49.638 WARN failed to locate config-drive, using the metadata service API instead May 10 03:33:49.739058 coreos-metadata[1130]: May 10 03:33:49.738 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys: Attempt #1 May 10 03:33:49.773089 sshd[1241]: Accepted publickey for core from 172.24.4.1 port 53804 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:33:49.776125 sshd[1241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:33:49.786418 systemd-logind[1143]: New session 3 of user core. May 10 03:33:49.788085 systemd[1]: Started session-3.scope. May 10 03:33:49.924261 coreos-metadata[1130]: May 10 03:33:49.923 INFO Fetch successful May 10 03:33:49.924261 coreos-metadata[1130]: May 10 03:33:49.923 INFO Fetching http://169.254.169.254/latest/meta-data/public-keys/0/openssh-key: Attempt #1 May 10 03:33:49.934752 coreos-metadata[1130]: May 10 03:33:49.934 INFO Fetch successful May 10 03:33:49.940869 unknown[1130]: wrote ssh authorized keys file for user: core May 10 03:33:49.982691 update-ssh-keys[1247]: Updated "/home/core/.ssh/authorized_keys" May 10 03:33:49.983543 systemd[1]: Finished coreos-metadata-sshkeys@core.service. May 10 03:33:49.984685 systemd[1]: Reached target multi-user.target. May 10 03:33:49.988073 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 10 03:33:50.000168 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 10 03:33:50.000739 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 10 03:33:50.002087 systemd[1]: Startup finished in 911ms (kernel) + 7.224s (initrd) + 13.736s (userspace) = 21.871s. May 10 03:33:50.566614 sshd[1241]: pam_unix(sshd:session): session closed for user core May 10 03:33:50.571866 systemd[1]: sshd@2-172.24.4.212:22-172.24.4.1:53804.service: Deactivated successfully. May 10 03:33:50.573628 systemd[1]: session-3.scope: Deactivated successfully. May 10 03:33:50.574971 systemd-logind[1143]: Session 3 logged out. Waiting for processes to exit. May 10 03:33:50.576877 systemd-logind[1143]: Removed session 3. May 10 03:33:56.141061 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 10 03:33:56.141566 systemd[1]: Stopped kubelet.service. May 10 03:33:56.141651 systemd[1]: kubelet.service: Consumed 1.694s CPU time. May 10 03:33:56.144657 systemd[1]: Starting kubelet.service... May 10 03:33:56.469872 systemd[1]: Started kubelet.service. May 10 03:33:56.632368 kubelet[1256]: E0510 03:33:56.632329 1256 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 03:33:56.636165 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 03:33:56.636468 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 03:34:00.574812 systemd[1]: Started sshd@3-172.24.4.212:22-172.24.4.1:43352.service. May 10 03:34:02.128075 sshd[1264]: Accepted publickey for core from 172.24.4.1 port 43352 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:34:02.130623 sshd[1264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:34:02.140848 systemd-logind[1143]: New session 4 of user core. May 10 03:34:02.141420 systemd[1]: Started session-4.scope. May 10 03:34:02.771047 sshd[1264]: pam_unix(sshd:session): session closed for user core May 10 03:34:02.776886 systemd[1]: Started sshd@4-172.24.4.212:22-172.24.4.1:43366.service. May 10 03:34:02.779430 systemd[1]: sshd@3-172.24.4.212:22-172.24.4.1:43352.service: Deactivated successfully. May 10 03:34:02.780544 systemd[1]: session-4.scope: Deactivated successfully. May 10 03:34:02.782630 systemd-logind[1143]: Session 4 logged out. Waiting for processes to exit. May 10 03:34:02.784342 systemd-logind[1143]: Removed session 4. May 10 03:34:03.979944 sshd[1269]: Accepted publickey for core from 172.24.4.1 port 43366 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:34:03.982547 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:34:03.990888 systemd[1]: Started session-5.scope. May 10 03:34:03.991918 systemd-logind[1143]: New session 5 of user core. May 10 03:34:04.623370 sshd[1269]: pam_unix(sshd:session): session closed for user core May 10 03:34:04.631604 systemd[1]: Started sshd@5-172.24.4.212:22-172.24.4.1:37912.service. May 10 03:34:04.632832 systemd[1]: sshd@4-172.24.4.212:22-172.24.4.1:43366.service: Deactivated successfully. May 10 03:34:04.635552 systemd[1]: session-5.scope: Deactivated successfully. May 10 03:34:04.638075 systemd-logind[1143]: Session 5 logged out. Waiting for processes to exit. May 10 03:34:04.640973 systemd-logind[1143]: Removed session 5. May 10 03:34:06.088504 sshd[1275]: Accepted publickey for core from 172.24.4.1 port 37912 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:34:06.090984 sshd[1275]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:34:06.101679 systemd[1]: Started session-6.scope. May 10 03:34:06.102520 systemd-logind[1143]: New session 6 of user core. May 10 03:34:06.652222 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 10 03:34:06.652691 systemd[1]: Stopped kubelet.service. May 10 03:34:06.655396 systemd[1]: Starting kubelet.service... May 10 03:34:06.941072 systemd[1]: Started kubelet.service. May 10 03:34:06.957335 sshd[1275]: pam_unix(sshd:session): session closed for user core May 10 03:34:06.963350 systemd[1]: Started sshd@6-172.24.4.212:22-172.24.4.1:37920.service. May 10 03:34:06.967593 systemd[1]: sshd@5-172.24.4.212:22-172.24.4.1:37912.service: Deactivated successfully. May 10 03:34:06.968698 systemd[1]: session-6.scope: Deactivated successfully. May 10 03:34:06.973764 systemd-logind[1143]: Session 6 logged out. Waiting for processes to exit. May 10 03:34:06.975138 systemd-logind[1143]: Removed session 6. May 10 03:34:07.038154 kubelet[1284]: E0510 03:34:07.038046 1284 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 03:34:07.041246 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 03:34:07.041584 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 03:34:08.486924 sshd[1290]: Accepted publickey for core from 172.24.4.1 port 37920 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:34:08.490064 sshd[1290]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:34:08.502071 systemd-logind[1143]: New session 7 of user core. May 10 03:34:08.502945 systemd[1]: Started session-7.scope. May 10 03:34:08.974698 sudo[1295]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 10 03:34:08.976022 sudo[1295]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 03:34:08.987662 dbus-daemon[1131]: \xd0\xfd(1\xd9U: received setenforce notice (enforcing=-1712728368) May 10 03:34:08.992904 sudo[1295]: pam_unix(sudo:session): session closed for user root May 10 03:34:09.180027 sshd[1290]: pam_unix(sshd:session): session closed for user core May 10 03:34:09.189164 systemd[1]: Started sshd@7-172.24.4.212:22-172.24.4.1:37936.service. May 10 03:34:09.193684 systemd[1]: sshd@6-172.24.4.212:22-172.24.4.1:37920.service: Deactivated successfully. May 10 03:34:09.195814 systemd[1]: session-7.scope: Deactivated successfully. May 10 03:34:09.201544 systemd-logind[1143]: Session 7 logged out. Waiting for processes to exit. May 10 03:34:09.205490 systemd-logind[1143]: Removed session 7. May 10 03:34:10.711157 sshd[1298]: Accepted publickey for core from 172.24.4.1 port 37936 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:34:10.714571 sshd[1298]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:34:10.724325 systemd-logind[1143]: New session 8 of user core. May 10 03:34:10.725030 systemd[1]: Started session-8.scope. May 10 03:34:11.198392 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 10 03:34:11.199561 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 03:34:11.205730 sudo[1303]: pam_unix(sudo:session): session closed for user root May 10 03:34:11.216096 sudo[1302]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 10 03:34:11.216667 sudo[1302]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 03:34:11.236902 systemd[1]: Stopping audit-rules.service... May 10 03:34:11.237000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 03:34:11.239663 auditctl[1306]: No rules May 10 03:34:11.242324 kernel: kauditd_printk_skb: 167 callbacks suppressed May 10 03:34:11.242464 kernel: audit: type=1305 audit(1746848051.237:202): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 10 03:34:11.243124 systemd[1]: audit-rules.service: Deactivated successfully. May 10 03:34:11.243517 systemd[1]: Stopped audit-rules.service. May 10 03:34:11.237000 audit[1306]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd5ae12690 a2=420 a3=0 items=0 ppid=1 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:11.265413 kernel: audit: type=1300 audit(1746848051.237:202): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd5ae12690 a2=420 a3=0 items=0 ppid=1 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:11.266655 systemd[1]: Starting audit-rules.service... May 10 03:34:11.237000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 10 03:34:11.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:11.287539 kernel: audit: type=1327 audit(1746848051.237:202): proctitle=2F7362696E2F617564697463746C002D44 May 10 03:34:11.287728 kernel: audit: type=1131 audit(1746848051.242:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:11.313692 augenrules[1323]: No rules May 10 03:34:11.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:11.315314 systemd[1]: Finished audit-rules.service. May 10 03:34:11.328350 kernel: audit: type=1130 audit(1746848051.314:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:11.328386 sudo[1302]: pam_unix(sudo:session): session closed for user root May 10 03:34:11.327000 audit[1302]: USER_END pid=1302 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:11.327000 audit[1302]: CRED_DISP pid=1302 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:11.355975 kernel: audit: type=1106 audit(1746848051.327:205): pid=1302 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:11.356093 kernel: audit: type=1104 audit(1746848051.327:206): pid=1302 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:11.590697 sshd[1298]: pam_unix(sshd:session): session closed for user core May 10 03:34:11.597616 systemd[1]: sshd@7-172.24.4.212:22-172.24.4.1:37936.service: Deactivated successfully. May 10 03:34:11.592000 audit[1298]: USER_END pid=1298 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:11.599424 systemd[1]: session-8.scope: Deactivated successfully. May 10 03:34:11.616372 kernel: audit: type=1106 audit(1746848051.592:207): pid=1298 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:11.592000 audit[1298]: CRED_DISP pid=1298 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:11.619702 systemd[1]: Started sshd@8-172.24.4.212:22-172.24.4.1:37938.service. May 10 03:34:11.630695 systemd-logind[1143]: Session 8 logged out. Waiting for processes to exit. May 10 03:34:11.631326 kernel: audit: type=1104 audit(1746848051.592:208): pid=1298 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:11.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.212:22-172.24.4.1:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:11.647481 kernel: audit: type=1131 audit(1746848051.596:209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-172.24.4.212:22-172.24.4.1:37936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:11.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.212:22-172.24.4.1:37938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:11.647488 systemd-logind[1143]: Removed session 8. May 10 03:34:13.460000 audit[1329]: USER_ACCT pid=1329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:13.461850 sshd[1329]: Accepted publickey for core from 172.24.4.1 port 37938 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:34:13.462000 audit[1329]: CRED_ACQ pid=1329 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:13.462000 audit[1329]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff222e8c70 a2=3 a3=0 items=0 ppid=1 pid=1329 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:13.462000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:34:13.465150 sshd[1329]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:34:13.475342 systemd-logind[1143]: New session 9 of user core. May 10 03:34:13.476103 systemd[1]: Started session-9.scope. May 10 03:34:13.487000 audit[1329]: USER_START pid=1329 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:13.490000 audit[1331]: CRED_ACQ pid=1331 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:13.924000 audit[1332]: USER_ACCT pid=1332 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:13.926820 sudo[1332]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 10 03:34:13.926000 audit[1332]: CRED_REFR pid=1332 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:13.928156 sudo[1332]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 10 03:34:13.931000 audit[1332]: USER_START pid=1332 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:13.987584 systemd[1]: Starting docker.service... May 10 03:34:14.069328 env[1342]: time="2025-05-10T03:34:14.069231910Z" level=info msg="Starting up" May 10 03:34:14.072805 env[1342]: time="2025-05-10T03:34:14.072751752Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 03:34:14.073109 env[1342]: time="2025-05-10T03:34:14.073071922Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 03:34:14.073375 env[1342]: time="2025-05-10T03:34:14.073267379Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 03:34:14.073541 env[1342]: time="2025-05-10T03:34:14.073507359Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 03:34:14.078397 env[1342]: time="2025-05-10T03:34:14.078338730Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 10 03:34:14.078650 env[1342]: time="2025-05-10T03:34:14.078613355Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 10 03:34:14.078828 env[1342]: time="2025-05-10T03:34:14.078787091Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 10 03:34:14.078975 env[1342]: time="2025-05-10T03:34:14.078943113Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 10 03:34:14.100011 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2310213723-merged.mount: Deactivated successfully. May 10 03:34:14.164384 env[1342]: time="2025-05-10T03:34:14.164324486Z" level=info msg="Loading containers: start." May 10 03:34:14.282000 audit[1373]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1373 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.282000 audit[1373]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffcae196e00 a2=0 a3=7ffcae196dec items=0 ppid=1342 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 10 03:34:14.284000 audit[1375]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1375 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.284000 audit[1375]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff6cb303e0 a2=0 a3=7fff6cb303cc items=0 ppid=1342 pid=1375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.284000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 10 03:34:14.289000 audit[1377]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.289000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcccfa44f0 a2=0 a3=7ffcccfa44dc items=0 ppid=1342 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.289000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 03:34:14.293000 audit[1379]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1379 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.293000 audit[1379]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffed611ea20 a2=0 a3=7ffed611ea0c items=0 ppid=1342 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 03:34:14.297000 audit[1381]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1381 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.297000 audit[1381]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff9b38a380 a2=0 a3=7fff9b38a36c items=0 ppid=1342 pid=1381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 10 03:34:14.314000 audit[1386]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.314000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebe295050 a2=0 a3=7ffebe29503c items=0 ppid=1342 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.314000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 10 03:34:14.330000 audit[1388]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.330000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe4d412d20 a2=0 a3=7ffe4d412d0c items=0 ppid=1342 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.330000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 10 03:34:14.332000 audit[1390]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.332000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffdc753f670 a2=0 a3=7ffdc753f65c items=0 ppid=1342 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 10 03:34:14.334000 audit[1392]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.334000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffde7cd5be0 a2=0 a3=7ffde7cd5bcc items=0 ppid=1342 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.334000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 03:34:14.346000 audit[1396]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.346000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc8d603ce0 a2=0 a3=7ffc8d603ccc items=0 ppid=1342 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.346000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 03:34:14.351000 audit[1397]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.351000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffce921b470 a2=0 a3=7ffce921b45c items=0 ppid=1342 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.351000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 03:34:14.365300 kernel: Initializing XFRM netlink socket May 10 03:34:14.420800 env[1342]: time="2025-05-10T03:34:14.420728772Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 10 03:34:14.458000 audit[1405]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.458000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffedcd741a0 a2=0 a3=7ffedcd7418c items=0 ppid=1342 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 10 03:34:14.472000 audit[1408]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.472000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff70929ec0 a2=0 a3=7fff70929eac items=0 ppid=1342 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.472000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 10 03:34:14.475000 audit[1411]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.475000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd70c4bde0 a2=0 a3=7ffd70c4bdcc items=0 ppid=1342 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.475000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 10 03:34:14.477000 audit[1413]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1413 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.477000 audit[1413]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeda32dd50 a2=0 a3=7ffeda32dd3c items=0 ppid=1342 pid=1413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.477000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 10 03:34:14.479000 audit[1415]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1415 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.479000 audit[1415]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fff3cf61250 a2=0 a3=7fff3cf6123c items=0 ppid=1342 pid=1415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.479000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 10 03:34:14.481000 audit[1417]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.481000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffc5bc2fd30 a2=0 a3=7ffc5bc2fd1c items=0 ppid=1342 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.481000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 10 03:34:14.484000 audit[1419]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1419 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.484000 audit[1419]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff7d219420 a2=0 a3=7fff7d21940c items=0 ppid=1342 pid=1419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.484000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 10 03:34:14.503000 audit[1422]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.503000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe8295ef30 a2=0 a3=7ffe8295ef1c items=0 ppid=1342 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.503000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 10 03:34:14.505000 audit[1424]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.505000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe4050e9e0 a2=0 a3=7ffe4050e9cc items=0 ppid=1342 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.505000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 10 03:34:14.508000 audit[1426]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.508000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffda1c93c60 a2=0 a3=7ffda1c93c4c items=0 ppid=1342 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.508000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 10 03:34:14.510000 audit[1428]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.510000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff05ccd5a0 a2=0 a3=7fff05ccd58c items=0 ppid=1342 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.510000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 10 03:34:14.512360 systemd-networkd[991]: docker0: Link UP May 10 03:34:14.524000 audit[1432]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.524000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd370efc0 a2=0 a3=7fffd370efac items=0 ppid=1342 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.524000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 10 03:34:14.529000 audit[1433]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:14.529000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd729b3280 a2=0 a3=7ffd729b326c items=0 ppid=1342 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:14.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 10 03:34:14.531066 env[1342]: time="2025-05-10T03:34:14.531016988Z" level=info msg="Loading containers: done." May 10 03:34:14.553661 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3466322825-merged.mount: Deactivated successfully. May 10 03:34:14.570110 env[1342]: time="2025-05-10T03:34:14.570018666Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 10 03:34:14.570515 env[1342]: time="2025-05-10T03:34:14.570475803Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 10 03:34:14.570724 env[1342]: time="2025-05-10T03:34:14.570691918Z" level=info msg="Daemon has completed initialization" May 10 03:34:14.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:14.606715 systemd[1]: Started docker.service. May 10 03:34:14.618855 env[1342]: time="2025-05-10T03:34:14.618803902Z" level=info msg="API listen on /run/docker.sock" May 10 03:34:16.620168 env[1150]: time="2025-05-10T03:34:16.620036690Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 10 03:34:17.045376 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. May 10 03:34:17.045815 systemd[1]: Stopped kubelet.service. May 10 03:34:17.063081 kernel: kauditd_printk_skb: 84 callbacks suppressed May 10 03:34:17.063219 kernel: audit: type=1130 audit(1746848057.044:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:17.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:17.048690 systemd[1]: Starting kubelet.service... May 10 03:34:17.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:17.077340 kernel: audit: type=1131 audit(1746848057.044:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:17.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:17.357241 systemd[1]: Started kubelet.service. May 10 03:34:17.369932 kernel: audit: type=1130 audit(1746848057.356:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:17.492052 kubelet[1476]: E0510 03:34:17.492017 1476 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 03:34:17.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 03:34:17.495471 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 03:34:17.495595 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 03:34:17.508324 kernel: audit: type=1131 audit(1746848057.494:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 03:34:17.623367 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2985145889.mount: Deactivated successfully. May 10 03:34:20.512736 env[1150]: time="2025-05-10T03:34:20.510494808Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:20.519259 env[1150]: time="2025-05-10T03:34:20.519195802Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:20.520815 env[1150]: time="2025-05-10T03:34:20.520745742Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 10 03:34:20.522179 env[1150]: time="2025-05-10T03:34:20.522146774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:20.523620 env[1150]: time="2025-05-10T03:34:20.523598171Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:20.541555 env[1150]: time="2025-05-10T03:34:20.541490134Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 10 03:34:23.482618 env[1150]: time="2025-05-10T03:34:23.482521340Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:23.493013 env[1150]: time="2025-05-10T03:34:23.492951938Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:23.496405 env[1150]: time="2025-05-10T03:34:23.496354047Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:23.500483 env[1150]: time="2025-05-10T03:34:23.500414850Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:23.501864 env[1150]: time="2025-05-10T03:34:23.501792819Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 10 03:34:23.523942 env[1150]: time="2025-05-10T03:34:23.523907131Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 10 03:34:25.500505 env[1150]: time="2025-05-10T03:34:25.500422225Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:25.503817 env[1150]: time="2025-05-10T03:34:25.503732765Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:25.509070 env[1150]: time="2025-05-10T03:34:25.509015547Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:25.515145 env[1150]: time="2025-05-10T03:34:25.515102796Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:25.515736 env[1150]: time="2025-05-10T03:34:25.515691118Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 10 03:34:25.527529 env[1150]: time="2025-05-10T03:34:25.527454956Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 10 03:34:27.024725 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3715174617.mount: Deactivated successfully. May 10 03:34:27.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:27.561186 kernel: audit: type=1130 audit(1746848067.544:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:27.545364 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. May 10 03:34:27.545800 systemd[1]: Stopped kubelet.service. May 10 03:34:27.562788 systemd[1]: Starting kubelet.service... May 10 03:34:27.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:27.581337 kernel: audit: type=1131 audit(1746848067.544:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:27.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:27.651248 systemd[1]: Started kubelet.service. May 10 03:34:27.657318 kernel: audit: type=1130 audit(1746848067.650:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:27.708577 kubelet[1502]: E0510 03:34:27.708542 1502 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 03:34:27.716495 kernel: audit: type=1131 audit(1746848067.709:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 03:34:27.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 03:34:27.710319 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 03:34:27.710447 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 03:34:28.146230 update_engine[1144]: I0510 03:34:28.145360 1144 update_attempter.cc:509] Updating boot flags... May 10 03:34:28.308913 env[1150]: time="2025-05-10T03:34:28.308867543Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:28.312146 env[1150]: time="2025-05-10T03:34:28.311555757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:28.316195 env[1150]: time="2025-05-10T03:34:28.316131228Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:28.318192 env[1150]: time="2025-05-10T03:34:28.318163504Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:28.318835 env[1150]: time="2025-05-10T03:34:28.318799466Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 10 03:34:28.329573 env[1150]: time="2025-05-10T03:34:28.329533883Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 10 03:34:28.970785 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1420369816.mount: Deactivated successfully. May 10 03:34:30.830966 env[1150]: time="2025-05-10T03:34:30.830884650Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:30.834229 env[1150]: time="2025-05-10T03:34:30.834175545Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:30.838894 env[1150]: time="2025-05-10T03:34:30.838814535Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:30.843419 env[1150]: time="2025-05-10T03:34:30.843364258Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:30.845721 env[1150]: time="2025-05-10T03:34:30.845618090Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 10 03:34:30.872249 env[1150]: time="2025-05-10T03:34:30.872168700Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 10 03:34:31.518619 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4253526906.mount: Deactivated successfully. May 10 03:34:31.533489 env[1150]: time="2025-05-10T03:34:31.533413062Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:31.537780 env[1150]: time="2025-05-10T03:34:31.537722467Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:31.543952 env[1150]: time="2025-05-10T03:34:31.543878931Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:31.549532 env[1150]: time="2025-05-10T03:34:31.549480385Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:31.552885 env[1150]: time="2025-05-10T03:34:31.551433445Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 10 03:34:31.574406 env[1150]: time="2025-05-10T03:34:31.574252576Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 10 03:34:32.230031 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4081157485.mount: Deactivated successfully. May 10 03:34:36.302663 env[1150]: time="2025-05-10T03:34:36.302568864Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:36.306523 env[1150]: time="2025-05-10T03:34:36.306479072Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:36.310680 env[1150]: time="2025-05-10T03:34:36.310630702Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:36.318604 env[1150]: time="2025-05-10T03:34:36.318553220Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 10 03:34:36.319083 env[1150]: time="2025-05-10T03:34:36.319042587Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:37.795465 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. May 10 03:34:37.795943 systemd[1]: Stopped kubelet.service. May 10 03:34:37.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:37.810913 systemd[1]: Starting kubelet.service... May 10 03:34:37.811305 kernel: audit: type=1130 audit(1746848077.794:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:37.794000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:37.828331 kernel: audit: type=1131 audit(1746848077.794:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:37.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:37.940782 systemd[1]: Started kubelet.service. May 10 03:34:37.950059 kernel: audit: type=1130 audit(1746848077.939:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:38.004708 kubelet[1607]: E0510 03:34:38.004660 1607 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 10 03:34:38.006040 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 10 03:34:38.006166 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 10 03:34:38.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 03:34:38.012315 kernel: audit: type=1131 audit(1746848078.005:255): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 03:34:40.158247 systemd[1]: Stopped kubelet.service. May 10 03:34:40.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:40.164289 kernel: audit: type=1130 audit(1746848080.157:256): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:40.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:40.169293 kernel: audit: type=1131 audit(1746848080.163:257): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:40.171016 systemd[1]: Starting kubelet.service... May 10 03:34:40.191692 systemd[1]: Reloading. May 10 03:34:40.313143 /usr/lib/systemd/system-generators/torcx-generator[1645]: time="2025-05-10T03:34:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 03:34:40.313173 /usr/lib/systemd/system-generators/torcx-generator[1645]: time="2025-05-10T03:34:40Z" level=info msg="torcx already run" May 10 03:34:40.515068 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 03:34:40.515721 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 03:34:40.537987 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 03:34:40.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.613000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.637189 kernel: audit: type=1400 audit(1746848080.613:258): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.637290 kernel: audit: type=1400 audit(1746848080.613:259): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.637320 kernel: audit: type=1400 audit(1746848080.619:260): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659756 kernel: audit: type=1400 audit(1746848080.619:261): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.619000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.619000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit: BPF prog-id=43 op=LOAD May 10 03:34:40.624000 audit: BPF prog-id=27 op=UNLOAD May 10 03:34:40.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.647000 audit: BPF prog-id=44 op=LOAD May 10 03:34:40.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.647000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.647000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.658000 audit: BPF prog-id=45 op=LOAD May 10 03:34:40.658000 audit: BPF prog-id=28 op=UNLOAD May 10 03:34:40.658000 audit: BPF prog-id=29 op=UNLOAD May 10 03:34:40.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.659000 audit: BPF prog-id=46 op=LOAD May 10 03:34:40.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.660000 audit: BPF prog-id=47 op=LOAD May 10 03:34:40.660000 audit: BPF prog-id=30 op=UNLOAD May 10 03:34:40.660000 audit: BPF prog-id=31 op=UNLOAD May 10 03:34:40.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.661000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit: BPF prog-id=48 op=LOAD May 10 03:34:40.662000 audit: BPF prog-id=38 op=UNLOAD May 10 03:34:40.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit: BPF prog-id=49 op=LOAD May 10 03:34:40.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.663000 audit: BPF prog-id=50 op=LOAD May 10 03:34:40.663000 audit: BPF prog-id=39 op=UNLOAD May 10 03:34:40.663000 audit: BPF prog-id=40 op=UNLOAD May 10 03:34:40.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit: BPF prog-id=51 op=LOAD May 10 03:34:40.665000 audit: BPF prog-id=32 op=UNLOAD May 10 03:34:40.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit: BPF prog-id=52 op=LOAD May 10 03:34:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.666000 audit: BPF prog-id=53 op=LOAD May 10 03:34:40.666000 audit: BPF prog-id=33 op=UNLOAD May 10 03:34:40.666000 audit: BPF prog-id=34 op=UNLOAD May 10 03:34:40.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.667000 audit: BPF prog-id=54 op=LOAD May 10 03:34:40.667000 audit: BPF prog-id=41 op=UNLOAD May 10 03:34:40.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.669000 audit: BPF prog-id=55 op=LOAD May 10 03:34:40.669000 audit: BPF prog-id=36 op=UNLOAD May 10 03:34:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.670000 audit: BPF prog-id=56 op=LOAD May 10 03:34:40.671000 audit: BPF prog-id=37 op=UNLOAD May 10 03:34:40.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:40.674000 audit: BPF prog-id=57 op=LOAD May 10 03:34:40.674000 audit: BPF prog-id=35 op=UNLOAD May 10 03:34:40.695160 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM May 10 03:34:40.695228 systemd[1]: kubelet.service: Failed with result 'signal'. May 10 03:34:40.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 10 03:34:40.695631 systemd[1]: Stopped kubelet.service. May 10 03:34:40.697804 systemd[1]: Starting kubelet.service... May 10 03:34:40.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:40.791414 systemd[1]: Started kubelet.service. May 10 03:34:40.843972 kubelet[1692]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 03:34:40.843972 kubelet[1692]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 03:34:40.843972 kubelet[1692]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 03:34:41.162219 kubelet[1692]: I0510 03:34:41.161825 1692 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 03:34:41.968524 kubelet[1692]: I0510 03:34:41.968461 1692 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 03:34:41.968524 kubelet[1692]: I0510 03:34:41.968524 1692 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 03:34:41.969005 kubelet[1692]: I0510 03:34:41.968967 1692 server.go:927] "Client rotation is on, will bootstrap in background" May 10 03:34:42.003773 kubelet[1692]: I0510 03:34:42.003745 1692 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 03:34:42.006744 kubelet[1692]: E0510 03:34:42.006695 1692 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://172.24.4.212:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.018314 kubelet[1692]: I0510 03:34:42.018297 1692 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 03:34:42.021445 kubelet[1692]: I0510 03:34:42.021421 1692 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 03:34:42.021692 kubelet[1692]: I0510 03:34:42.021511 1692 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-13802d7031.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 03:34:42.021836 kubelet[1692]: I0510 03:34:42.021825 1692 topology_manager.go:138] "Creating topology manager with none policy" May 10 03:34:42.021899 kubelet[1692]: I0510 03:34:42.021891 1692 container_manager_linux.go:301] "Creating device plugin manager" May 10 03:34:42.023349 kubelet[1692]: I0510 03:34:42.023337 1692 state_mem.go:36] "Initialized new in-memory state store" May 10 03:34:42.024667 kubelet[1692]: I0510 03:34:42.024655 1692 kubelet.go:400] "Attempting to sync node with API server" May 10 03:34:42.024759 kubelet[1692]: I0510 03:34:42.024749 1692 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 03:34:42.024834 kubelet[1692]: I0510 03:34:42.024825 1692 kubelet.go:312] "Adding apiserver pod source" May 10 03:34:42.024914 kubelet[1692]: I0510 03:34:42.024903 1692 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 03:34:42.025623 kubelet[1692]: W0510 03:34:42.025532 1692 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.212:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-13802d7031.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.025678 kubelet[1692]: E0510 03:34:42.025665 1692 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.212:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-13802d7031.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.054392 kubelet[1692]: W0510 03:34:42.054311 1692 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.212:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.054621 kubelet[1692]: E0510 03:34:42.054595 1692 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.212:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.054945 kubelet[1692]: I0510 03:34:42.054908 1692 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 03:34:42.058850 kubelet[1692]: I0510 03:34:42.058817 1692 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 03:34:42.059126 kubelet[1692]: W0510 03:34:42.059100 1692 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 10 03:34:42.060696 kubelet[1692]: I0510 03:34:42.060664 1692 server.go:1264] "Started kubelet" May 10 03:34:42.075433 kubelet[1692]: I0510 03:34:42.075346 1692 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 03:34:42.077614 kubelet[1692]: I0510 03:34:42.077568 1692 server.go:455] "Adding debug handlers to kubelet server" May 10 03:34:42.077899 kubelet[1692]: I0510 03:34:42.077812 1692 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 03:34:42.078619 kubelet[1692]: I0510 03:34:42.078587 1692 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 03:34:42.082239 kubelet[1692]: E0510 03:34:42.082042 1692 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.212:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.212:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-n-13802d7031.novalocal.183e0d134fcb8f6e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-13802d7031.novalocal,UID:ci-3510-3-7-n-13802d7031.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-13802d7031.novalocal,},FirstTimestamp:2025-05-10 03:34:42.060611438 +0000 UTC m=+1.260888763,LastTimestamp:2025-05-10 03:34:42.060611438 +0000 UTC m=+1.260888763,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-13802d7031.novalocal,}" May 10 03:34:42.083000 audit[1692]: AVC avc: denied { mac_admin } for pid=1692 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:42.083000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 03:34:42.083000 audit[1692]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000acca80 a1=c00087d278 a2=c000acca50 a3=25 items=0 ppid=1 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.083000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 03:34:42.085888 kubelet[1692]: I0510 03:34:42.085846 1692 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 03:34:42.084000 audit[1692]: AVC avc: denied { mac_admin } for pid=1692 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:42.084000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 03:34:42.084000 audit[1692]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ab86c0 a1=c00087d290 a2=c000accb10 a3=25 items=0 ppid=1 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.084000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 03:34:42.086712 kubelet[1692]: I0510 03:34:42.086677 1692 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 03:34:42.087009 kubelet[1692]: I0510 03:34:42.086981 1692 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 03:34:42.091388 kubelet[1692]: I0510 03:34:42.091354 1692 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 03:34:42.092937 kubelet[1692]: I0510 03:34:42.092901 1692 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 03:34:42.093360 kubelet[1692]: I0510 03:34:42.093246 1692 reconciler.go:26] "Reconciler: start to sync state" May 10 03:34:42.096556 kubelet[1692]: W0510 03:34:42.096478 1692 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.212:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.096773 kubelet[1692]: E0510 03:34:42.096744 1692 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.212:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.097106 kubelet[1692]: E0510 03:34:42.097049 1692 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-13802d7031.novalocal?timeout=10s\": dial tcp 172.24.4.212:6443: connect: connection refused" interval="200ms" May 10 03:34:42.097841 kubelet[1692]: I0510 03:34:42.097790 1692 factory.go:221] Registration of the systemd container factory successfully May 10 03:34:42.098358 kubelet[1692]: I0510 03:34:42.098319 1692 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 03:34:42.103000 audit[1703]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1703 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:42.103000 audit[1703]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe74855af0 a2=0 a3=7ffe74855adc items=0 ppid=1692 pid=1703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 03:34:42.105331 kubelet[1692]: I0510 03:34:42.105237 1692 factory.go:221] Registration of the containerd container factory successfully May 10 03:34:42.106000 audit[1704]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1704 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:42.106000 audit[1704]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe4a27ab40 a2=0 a3=7ffe4a27ab2c items=0 ppid=1692 pid=1704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 03:34:42.112757 kubelet[1692]: E0510 03:34:42.112711 1692 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 03:34:42.113000 audit[1706]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1706 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:42.113000 audit[1706]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd27cfbee0 a2=0 a3=7ffd27cfbecc items=0 ppid=1692 pid=1706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 03:34:42.122000 audit[1708]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1708 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:42.122000 audit[1708]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdfd544290 a2=0 a3=7ffdfd54427c items=0 ppid=1692 pid=1708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 03:34:42.135000 audit[1712]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1712 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:42.135000 audit[1712]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd536f3950 a2=0 a3=7ffd536f393c items=0 ppid=1692 pid=1712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.135000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 10 03:34:42.137823 kubelet[1692]: I0510 03:34:42.137745 1692 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 03:34:42.138000 audit[1713]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:34:42.138000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde26c85e0 a2=0 a3=7ffde26c85cc items=0 ppid=1692 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.138000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 10 03:34:42.141771 kubelet[1692]: I0510 03:34:42.141747 1692 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 03:34:42.141885 kubelet[1692]: I0510 03:34:42.141874 1692 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 03:34:42.141968 kubelet[1692]: I0510 03:34:42.141957 1692 kubelet.go:2337] "Starting kubelet main sync loop" May 10 03:34:42.142104 kubelet[1692]: E0510 03:34:42.142065 1692 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 03:34:42.141000 audit[1716]: NETFILTER_CFG table=mangle:32 family=10 entries=1 op=nft_register_chain pid=1716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:34:42.141000 audit[1716]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc96d294a0 a2=0 a3=7ffc96d2948c items=0 ppid=1692 pid=1716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 03:34:42.143000 audit[1718]: NETFILTER_CFG table=nat:33 family=10 entries=2 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:34:42.143000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffeaa1972d0 a2=0 a3=7ffeaa1972bc items=0 ppid=1692 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.144971 kubelet[1692]: W0510 03:34:42.144948 1692 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.212:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.145058 kubelet[1692]: E0510 03:34:42.145046 1692 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.212:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:42.145233 kubelet[1692]: E0510 03:34:42.145157 1692 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://172.24.4.212:6443/api/v1/namespaces/default/events\": dial tcp 172.24.4.212:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510-3-7-n-13802d7031.novalocal.183e0d134fcb8f6e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-13802d7031.novalocal,UID:ci-3510-3-7-n-13802d7031.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-13802d7031.novalocal,},FirstTimestamp:2025-05-10 03:34:42.060611438 +0000 UTC m=+1.260888763,LastTimestamp:2025-05-10 03:34:42.060611438 +0000 UTC m=+1.260888763,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-13802d7031.novalocal,}" May 10 03:34:42.143000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 03:34:42.144000 audit[1715]: NETFILTER_CFG table=mangle:34 family=2 entries=1 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:42.144000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffabfb24e0 a2=0 a3=7fffabfb24cc items=0 ppid=1692 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.144000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 10 03:34:42.145000 audit[1720]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:42.145000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3c0c7880 a2=0 a3=7ffc3c0c786c items=0 ppid=1692 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.145000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 10 03:34:42.146000 audit[1721]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1721 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:34:42.146000 audit[1721]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdc4f1d6d0 a2=0 a3=7ffdc4f1d6bc items=0 ppid=1692 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.146000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 03:34:42.148000 audit[1722]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:34:42.148000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd445204e0 a2=0 a3=7ffd445204cc items=0 ppid=1692 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.148000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 10 03:34:42.165911 kubelet[1692]: I0510 03:34:42.165865 1692 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 03:34:42.165985 kubelet[1692]: I0510 03:34:42.165945 1692 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 03:34:42.166036 kubelet[1692]: I0510 03:34:42.165995 1692 state_mem.go:36] "Initialized new in-memory state store" May 10 03:34:42.176719 kubelet[1692]: I0510 03:34:42.176650 1692 policy_none.go:49] "None policy: Start" May 10 03:34:42.177326 kubelet[1692]: I0510 03:34:42.177310 1692 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 03:34:42.177414 kubelet[1692]: I0510 03:34:42.177405 1692 state_mem.go:35] "Initializing new in-memory state store" May 10 03:34:42.189437 systemd[1]: Created slice kubepods.slice. May 10 03:34:42.195432 kubelet[1692]: I0510 03:34:42.195409 1692 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.196026 kubelet[1692]: E0510 03:34:42.196008 1692 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.212:6443/api/v1/nodes\": dial tcp 172.24.4.212:6443: connect: connection refused" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.196958 systemd[1]: Created slice kubepods-burstable.slice. May 10 03:34:42.201458 systemd[1]: Created slice kubepods-besteffort.slice. May 10 03:34:42.210230 kubelet[1692]: I0510 03:34:42.210214 1692 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 03:34:42.209000 audit[1692]: AVC avc: denied { mac_admin } for pid=1692 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:42.209000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 03:34:42.209000 audit[1692]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00089d6e0 a1=c000957110 a2=c00089d6b0 a3=25 items=0 ppid=1 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:42.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 03:34:42.210613 kubelet[1692]: I0510 03:34:42.210598 1692 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 03:34:42.210778 kubelet[1692]: I0510 03:34:42.210747 1692 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 03:34:42.210941 kubelet[1692]: I0510 03:34:42.210930 1692 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 03:34:42.213076 kubelet[1692]: E0510 03:34:42.212971 1692 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510-3-7-n-13802d7031.novalocal\" not found" May 10 03:34:42.245387 kubelet[1692]: I0510 03:34:42.243192 1692 topology_manager.go:215] "Topology Admit Handler" podUID="9e6cd737a760c36fc437cd67b5aec329" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.252336 kubelet[1692]: I0510 03:34:42.251447 1692 topology_manager.go:215] "Topology Admit Handler" podUID="90f5301c56b167d1c40bcad92244102c" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.256216 kubelet[1692]: I0510 03:34:42.256148 1692 topology_manager.go:215] "Topology Admit Handler" podUID="e9e3c63a3bc311a1c7f24440ff658b67" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.269308 systemd[1]: Created slice kubepods-burstable-pod9e6cd737a760c36fc437cd67b5aec329.slice. May 10 03:34:42.283602 systemd[1]: Created slice kubepods-burstable-pod90f5301c56b167d1c40bcad92244102c.slice. May 10 03:34:42.296836 kubelet[1692]: I0510 03:34:42.295396 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.296357 systemd[1]: Created slice kubepods-burstable-pode9e3c63a3bc311a1c7f24440ff658b67.slice. May 10 03:34:42.299336 kubelet[1692]: E0510 03:34:42.298607 1692 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-13802d7031.novalocal?timeout=10s\": dial tcp 172.24.4.212:6443: connect: connection refused" interval="400ms" May 10 03:34:42.396999 kubelet[1692]: I0510 03:34:42.396901 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e9e3c63a3bc311a1c7f24440ff658b67-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"e9e3c63a3bc311a1c7f24440ff658b67\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.397919 kubelet[1692]: I0510 03:34:42.397147 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e9e3c63a3bc311a1c7f24440ff658b67-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"e9e3c63a3bc311a1c7f24440ff658b67\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.397919 kubelet[1692]: I0510 03:34:42.397364 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e9e3c63a3bc311a1c7f24440ff658b67-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"e9e3c63a3bc311a1c7f24440ff658b67\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.397919 kubelet[1692]: I0510 03:34:42.397544 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.397919 kubelet[1692]: I0510 03:34:42.397637 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.398258 kubelet[1692]: I0510 03:34:42.397732 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.398258 kubelet[1692]: I0510 03:34:42.397817 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.398549 kubelet[1692]: I0510 03:34:42.397868 1692 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/90f5301c56b167d1c40bcad92244102c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"90f5301c56b167d1c40bcad92244102c\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.400237 kubelet[1692]: I0510 03:34:42.400174 1692 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.400833 kubelet[1692]: E0510 03:34:42.400777 1692 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.212:6443/api/v1/nodes\": dial tcp 172.24.4.212:6443: connect: connection refused" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.589085 env[1150]: time="2025-05-10T03:34:42.588974888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal,Uid:9e6cd737a760c36fc437cd67b5aec329,Namespace:kube-system,Attempt:0,}" May 10 03:34:42.594451 env[1150]: time="2025-05-10T03:34:42.594062495Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal,Uid:90f5301c56b167d1c40bcad92244102c,Namespace:kube-system,Attempt:0,}" May 10 03:34:42.601673 env[1150]: time="2025-05-10T03:34:42.601454572Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal,Uid:e9e3c63a3bc311a1c7f24440ff658b67,Namespace:kube-system,Attempt:0,}" May 10 03:34:42.700427 kubelet[1692]: E0510 03:34:42.700357 1692 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-13802d7031.novalocal?timeout=10s\": dial tcp 172.24.4.212:6443: connect: connection refused" interval="800ms" May 10 03:34:42.804898 kubelet[1692]: I0510 03:34:42.804247 1692 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:42.804898 kubelet[1692]: E0510 03:34:42.804840 1692 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.212:6443/api/v1/nodes\": dial tcp 172.24.4.212:6443: connect: connection refused" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:43.064970 kubelet[1692]: W0510 03:34:43.064863 1692 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://172.24.4.212:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-13802d7031.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:43.064970 kubelet[1692]: E0510 03:34:43.064974 1692 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://172.24.4.212:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510-3-7-n-13802d7031.novalocal&limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:43.133385 kubelet[1692]: W0510 03:34:43.133269 1692 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://172.24.4.212:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:43.133385 kubelet[1692]: E0510 03:34:43.133375 1692 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://172.24.4.212:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:43.164778 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2096465730.mount: Deactivated successfully. May 10 03:34:43.174484 env[1150]: time="2025-05-10T03:34:43.174419629Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.181527 env[1150]: time="2025-05-10T03:34:43.181443455Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.183866 env[1150]: time="2025-05-10T03:34:43.183812767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.189769 env[1150]: time="2025-05-10T03:34:43.189681208Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.194486 env[1150]: time="2025-05-10T03:34:43.192677164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.196258 env[1150]: time="2025-05-10T03:34:43.196214515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.202476 env[1150]: time="2025-05-10T03:34:43.202429676Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.209430 env[1150]: time="2025-05-10T03:34:43.209376448Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.212230 env[1150]: time="2025-05-10T03:34:43.212187798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.214217 env[1150]: time="2025-05-10T03:34:43.214195501Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.215012 env[1150]: time="2025-05-10T03:34:43.214991012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.215825 env[1150]: time="2025-05-10T03:34:43.215803937Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:34:43.246063 env[1150]: time="2025-05-10T03:34:43.245950078Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:34:43.246063 env[1150]: time="2025-05-10T03:34:43.245996415Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:34:43.246063 env[1150]: time="2025-05-10T03:34:43.246010291Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:34:43.246464 env[1150]: time="2025-05-10T03:34:43.246386427Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f87295d8fe98f3f120c08343fdff77d96c1ee8192408f1d38356340e981b8f61 pid=1730 runtime=io.containerd.runc.v2 May 10 03:34:43.278046 systemd[1]: Started cri-containerd-f87295d8fe98f3f120c08343fdff77d96c1ee8192408f1d38356340e981b8f61.scope. May 10 03:34:43.286627 env[1150]: time="2025-05-10T03:34:43.273740985Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:34:43.286627 env[1150]: time="2025-05-10T03:34:43.273780980Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:34:43.286627 env[1150]: time="2025-05-10T03:34:43.273794305Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:34:43.286627 env[1150]: time="2025-05-10T03:34:43.273896866Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/af566fc9e842bff189ffb1095eb1735cb340ac327d811a1308fb5283593a1231 pid=1758 runtime=io.containerd.runc.v2 May 10 03:34:43.301605 systemd[1]: Started cri-containerd-af566fc9e842bff189ffb1095eb1735cb340ac327d811a1308fb5283593a1231.scope. May 10 03:34:43.305427 env[1150]: time="2025-05-10T03:34:43.305320213Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:34:43.305536 env[1150]: time="2025-05-10T03:34:43.305425070Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:34:43.305536 env[1150]: time="2025-05-10T03:34:43.305454645Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:34:43.310784 env[1150]: time="2025-05-10T03:34:43.305801104Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2eaeee0a2326898d05b6261e4350ee4a8447d22779ccc83c4d025f0618925f2c pid=1785 runtime=io.containerd.runc.v2 May 10 03:34:43.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.314559 kernel: kauditd_printk_skb: 218 callbacks suppressed May 10 03:34:43.314620 kernel: audit: type=1400 audit(1746848083.311:447): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.326445 kernel: audit: type=1400 audit(1746848083.311:448): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.334359 kernel: audit: type=1400 audit(1746848083.311:449): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.342329 kernel: audit: type=1400 audit(1746848083.311:450): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.348883 kernel: audit: type=1400 audit(1746848083.311:451): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361413 kernel: audit: type=1400 audit(1746848083.311:452): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361521 kernel: audit: type=1400 audit(1746848083.311:453): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.364377 env[1150]: time="2025-05-10T03:34:43.364334681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal,Uid:9e6cd737a760c36fc437cd67b5aec329,Namespace:kube-system,Attempt:0,} returns sandbox id \"f87295d8fe98f3f120c08343fdff77d96c1ee8192408f1d38356340e981b8f61\"" May 10 03:34:43.366946 systemd[1]: Started cri-containerd-2eaeee0a2326898d05b6261e4350ee4a8447d22779ccc83c4d025f0618925f2c.scope. May 10 03:34:43.373376 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 10 03:34:43.373585 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 10 03:34:43.373715 kernel: audit: backlog limit exceeded May 10 03:34:43.311000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.311000 audit: BPF prog-id=58 op=LOAD May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1730 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373239356438666539386633663132306330383334336664666637 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1730 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373239356438666539386633663132306330383334336664666637 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit: BPF prog-id=59 op=LOAD May 10 03:34:43.318000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003651b0 items=0 ppid=1730 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373239356438666539386633663132306330383334336664666637 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit: BPF prog-id=60 op=LOAD May 10 03:34:43.318000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003651f8 items=0 ppid=1730 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373239356438666539386633663132306330383334336664666637 May 10 03:34:43.318000 audit: BPF prog-id=60 op=UNLOAD May 10 03:34:43.318000 audit: BPF prog-id=59 op=UNLOAD May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { perfmon } for pid=1741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit[1741]: AVC avc: denied { bpf } for pid=1741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.318000 audit: BPF prog-id=61 op=LOAD May 10 03:34:43.318000 audit[1741]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000365608 items=0 ppid=1730 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638373239356438666539386633663132306330383334336664666637 May 10 03:34:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.362000 audit: BPF prog-id=62 op=LOAD May 10 03:34:43.373000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1758 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353636666339653834326266663138396666623130393565623137 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.373000 audit: BPF prog-id=63 op=LOAD May 10 03:34:43.373000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2150 items=0 ppid=1758 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.373000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353636666339653834326266663138396666623130393565623137 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit: BPF prog-id=64 op=LOAD May 10 03:34:43.374000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c2198 items=0 ppid=1758 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353636666339653834326266663138396666623130393565623137 May 10 03:34:43.374000 audit: BPF prog-id=64 op=UNLOAD May 10 03:34:43.374000 audit: BPF prog-id=63 op=UNLOAD May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.374000 audit: BPF prog-id=65 op=LOAD May 10 03:34:43.374000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c25a8 items=0 ppid=1758 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166353636666339653834326266663138396666623130393565623137 May 10 03:34:43.380907 env[1150]: time="2025-05-10T03:34:43.380871370Z" level=info msg="CreateContainer within sandbox \"f87295d8fe98f3f120c08343fdff77d96c1ee8192408f1d38356340e981b8f61\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 10 03:34:43.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.391000 audit: BPF prog-id=66 op=LOAD May 10 03:34:43.392000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.392000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1785 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616565653061323332363839386430356236323631653433353065 May 10 03:34:43.392000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.392000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1785 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616565653061323332363839386430356236323631653433353065 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.393000 audit: BPF prog-id=67 op=LOAD May 10 03:34:43.393000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000422050 items=0 ppid=1785 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616565653061323332363839386430356236323631653433353065 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit: BPF prog-id=68 op=LOAD May 10 03:34:43.394000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000422098 items=0 ppid=1785 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616565653061323332363839386430356236323631653433353065 May 10 03:34:43.394000 audit: BPF prog-id=68 op=UNLOAD May 10 03:34:43.394000 audit: BPF prog-id=67 op=UNLOAD May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.394000 audit: BPF prog-id=69 op=LOAD May 10 03:34:43.394000 audit[1804]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0004224a8 items=0 ppid=1785 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265616565653061323332363839386430356236323631653433353065 May 10 03:34:43.420320 env[1150]: time="2025-05-10T03:34:43.420246221Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal,Uid:90f5301c56b167d1c40bcad92244102c,Namespace:kube-system,Attempt:0,} returns sandbox id \"af566fc9e842bff189ffb1095eb1735cb340ac327d811a1308fb5283593a1231\"" May 10 03:34:43.424226 env[1150]: time="2025-05-10T03:34:43.424191738Z" level=info msg="CreateContainer within sandbox \"af566fc9e842bff189ffb1095eb1735cb340ac327d811a1308fb5283593a1231\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 10 03:34:43.424633 env[1150]: time="2025-05-10T03:34:43.424472033Z" level=info msg="CreateContainer within sandbox \"f87295d8fe98f3f120c08343fdff77d96c1ee8192408f1d38356340e981b8f61\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"10cd9834d4a7f85f1b00cc398a2fab1cf3cfdcc506bdf49176a244cd75220f35\"" May 10 03:34:43.439997 env[1150]: time="2025-05-10T03:34:43.439953364Z" level=info msg="StartContainer for \"10cd9834d4a7f85f1b00cc398a2fab1cf3cfdcc506bdf49176a244cd75220f35\"" May 10 03:34:43.440199 env[1150]: time="2025-05-10T03:34:43.440140414Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal,Uid:e9e3c63a3bc311a1c7f24440ff658b67,Namespace:kube-system,Attempt:0,} returns sandbox id \"2eaeee0a2326898d05b6261e4350ee4a8447d22779ccc83c4d025f0618925f2c\"" May 10 03:34:43.443242 env[1150]: time="2025-05-10T03:34:43.443208245Z" level=info msg="CreateContainer within sandbox \"2eaeee0a2326898d05b6261e4350ee4a8447d22779ccc83c4d025f0618925f2c\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 10 03:34:43.448814 env[1150]: time="2025-05-10T03:34:43.448771694Z" level=info msg="CreateContainer within sandbox \"af566fc9e842bff189ffb1095eb1735cb340ac327d811a1308fb5283593a1231\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"43d8ea20479ae78f47fb0c0e6674b54db5c4ea4b02586fd33c8d6690e745c236\"" May 10 03:34:43.449525 env[1150]: time="2025-05-10T03:34:43.449502485Z" level=info msg="StartContainer for \"43d8ea20479ae78f47fb0c0e6674b54db5c4ea4b02586fd33c8d6690e745c236\"" May 10 03:34:43.467531 systemd[1]: Started cri-containerd-10cd9834d4a7f85f1b00cc398a2fab1cf3cfdcc506bdf49176a244cd75220f35.scope. May 10 03:34:43.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.480000 audit: BPF prog-id=70 op=LOAD May 10 03:34:43.482000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.482000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1730 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636439383334643461376638356631623030636333393861326661 May 10 03:34:43.482000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.482000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1730 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.482000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636439383334643461376638356631623030636333393861326661 May 10 03:34:43.484506 env[1150]: time="2025-05-10T03:34:43.484452502Z" level=info msg="CreateContainer within sandbox \"2eaeee0a2326898d05b6261e4350ee4a8447d22779ccc83c4d025f0618925f2c\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"595d8aa62f107e6736887eaedec4eaa198956164c5dbb91b2a1e04f19f7550d1\"" May 10 03:34:43.484623 systemd[1]: Started cri-containerd-43d8ea20479ae78f47fb0c0e6674b54db5c4ea4b02586fd33c8d6690e745c236.scope. May 10 03:34:43.485400 kubelet[1692]: W0510 03:34:43.484703 1692 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://172.24.4.212:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:43.485400 kubelet[1692]: E0510 03:34:43.484743 1692 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://172.24.4.212:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:43.486148 env[1150]: time="2025-05-10T03:34:43.486125427Z" level=info msg="StartContainer for \"595d8aa62f107e6736887eaedec4eaa198956164c5dbb91b2a1e04f19f7550d1\"" May 10 03:34:43.486000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.486000 audit: BPF prog-id=71 op=LOAD May 10 03:34:43.486000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000286e80 items=0 ppid=1730 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.486000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636439383334643461376638356631623030636333393861326661 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit: BPF prog-id=72 op=LOAD May 10 03:34:43.487000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000286ec8 items=0 ppid=1730 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636439383334643461376638356631623030636333393861326661 May 10 03:34:43.487000 audit: BPF prog-id=72 op=UNLOAD May 10 03:34:43.487000 audit: BPF prog-id=71 op=UNLOAD May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.487000 audit: BPF prog-id=73 op=LOAD May 10 03:34:43.487000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002872d8 items=0 ppid=1730 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130636439383334643461376638356631623030636333393861326661 May 10 03:34:43.501480 kubelet[1692]: E0510 03:34:43.501428 1692 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://172.24.4.212:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510-3-7-n-13802d7031.novalocal?timeout=10s\": dial tcp 172.24.4.212:6443: connect: connection refused" interval="1.6s" May 10 03:34:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.506000 audit: BPF prog-id=74 op=LOAD May 10 03:34:43.506000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.506000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1758 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643865613230343739616537386634376662306330653636373462 May 10 03:34:43.506000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.506000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1758 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643865613230343739616537386634376662306330653636373462 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit: BPF prog-id=75 op=LOAD May 10 03:34:43.507000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000313570 items=0 ppid=1758 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643865613230343739616537386634376662306330653636373462 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.507000 audit: BPF prog-id=76 op=LOAD May 10 03:34:43.507000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003135b8 items=0 ppid=1758 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643865613230343739616537386634376662306330653636373462 May 10 03:34:43.508000 audit: BPF prog-id=76 op=UNLOAD May 10 03:34:43.508000 audit: BPF prog-id=75 op=UNLOAD May 10 03:34:43.508000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { perfmon } for pid=1874 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit[1874]: AVC avc: denied { bpf } for pid=1874 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.508000 audit: BPF prog-id=77 op=LOAD May 10 03:34:43.508000 audit[1874]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003139c8 items=0 ppid=1758 pid=1874 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433643865613230343739616537386634376662306330653636373462 May 10 03:34:43.519792 systemd[1]: Started cri-containerd-595d8aa62f107e6736887eaedec4eaa198956164c5dbb91b2a1e04f19f7550d1.scope. May 10 03:34:43.548095 env[1150]: time="2025-05-10T03:34:43.548048567Z" level=info msg="StartContainer for \"10cd9834d4a7f85f1b00cc398a2fab1cf3cfdcc506bdf49176a244cd75220f35\" returns successfully" May 10 03:34:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.554000 audit: BPF prog-id=78 op=LOAD May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1785 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356438616136326631303765363733363838376561656465633465 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1785 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356438616136326631303765363733363838376561656465633465 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit: BPF prog-id=79 op=LOAD May 10 03:34:43.555000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000396ff0 items=0 ppid=1785 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356438616136326631303765363733363838376561656465633465 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit: BPF prog-id=80 op=LOAD May 10 03:34:43.555000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000397038 items=0 ppid=1785 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356438616136326631303765363733363838376561656465633465 May 10 03:34:43.555000 audit: BPF prog-id=80 op=UNLOAD May 10 03:34:43.555000 audit: BPF prog-id=79 op=UNLOAD May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { perfmon } for pid=1901 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit[1901]: AVC avc: denied { bpf } for pid=1901 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:43.555000 audit: BPF prog-id=81 op=LOAD May 10 03:34:43.555000 audit[1901]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000397448 items=0 ppid=1785 pid=1901 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:43.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539356438616136326631303765363733363838376561656465633465 May 10 03:34:43.563310 env[1150]: time="2025-05-10T03:34:43.563245676Z" level=info msg="StartContainer for \"43d8ea20479ae78f47fb0c0e6674b54db5c4ea4b02586fd33c8d6690e745c236\" returns successfully" May 10 03:34:43.600457 env[1150]: time="2025-05-10T03:34:43.600370359Z" level=info msg="StartContainer for \"595d8aa62f107e6736887eaedec4eaa198956164c5dbb91b2a1e04f19f7550d1\" returns successfully" May 10 03:34:43.606584 kubelet[1692]: I0510 03:34:43.606317 1692 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:43.606584 kubelet[1692]: E0510 03:34:43.606559 1692 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://172.24.4.212:6443/api/v1/nodes\": dial tcp 172.24.4.212:6443: connect: connection refused" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:43.630136 kubelet[1692]: W0510 03:34:43.630083 1692 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://172.24.4.212:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:43.630324 kubelet[1692]: E0510 03:34:43.630151 1692 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://172.24.4.212:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 172.24.4.212:6443: connect: connection refused May 10 03:34:44.888000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:44.888000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a605a0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:34:44.888000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:34:44.888000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:44.888000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000cbc280 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:34:44.888000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:34:45.208455 kubelet[1692]: I0510 03:34:45.208362 1692 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:45.300000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:45.300000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0041f4270 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:34:45.300000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:34:45.301000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:45.301000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c002fb9960 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:34:45.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:34:45.302000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:45.302000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0041f44b0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:34:45.302000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:34:45.311000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:45.311000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=49 a1=c0051ba780 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:34:45.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:34:45.324000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:45.324000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c004e55880 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:34:45.324000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:34:45.324000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:45.324000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0030651d0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:34:45.324000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:34:45.377444 kubelet[1692]: E0510 03:34:45.377405 1692 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510-3-7-n-13802d7031.novalocal\" not found" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:45.446879 kubelet[1692]: I0510 03:34:45.446845 1692 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:45.514931 kubelet[1692]: E0510 03:34:45.514800 1692 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-13802d7031.novalocal\" not found" May 10 03:34:45.615435 kubelet[1692]: E0510 03:34:45.615399 1692 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-13802d7031.novalocal\" not found" May 10 03:34:45.716228 kubelet[1692]: E0510 03:34:45.716181 1692 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-13802d7031.novalocal\" not found" May 10 03:34:45.817259 kubelet[1692]: E0510 03:34:45.817091 1692 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-13802d7031.novalocal\" not found" May 10 03:34:45.917787 kubelet[1692]: E0510 03:34:45.917727 1692 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-13802d7031.novalocal\" not found" May 10 03:34:46.018779 kubelet[1692]: E0510 03:34:46.018742 1692 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-13802d7031.novalocal\" not found" May 10 03:34:46.119209 kubelet[1692]: E0510 03:34:46.119086 1692 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510-3-7-n-13802d7031.novalocal\" not found" May 10 03:34:46.232078 kubelet[1692]: E0510 03:34:46.232014 1692 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:47.029039 kubelet[1692]: I0510 03:34:47.028957 1692 apiserver.go:52] "Watching apiserver" May 10 03:34:47.094089 kubelet[1692]: I0510 03:34:47.094020 1692 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 03:34:47.353413 kubelet[1692]: W0510 03:34:47.353316 1692 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 03:34:48.333768 systemd[1]: Reloading. May 10 03:34:48.469690 /usr/lib/systemd/system-generators/torcx-generator[1979]: time="2025-05-10T03:34:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.7 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.7 /var/lib/torcx/store]" May 10 03:34:48.469720 /usr/lib/systemd/system-generators/torcx-generator[1979]: time="2025-05-10T03:34:48Z" level=info msg="torcx already run" May 10 03:34:48.552575 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 10 03:34:48.552594 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 10 03:34:48.574953 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 10 03:34:48.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.673165 kernel: kauditd_printk_skb: 356 callbacks suppressed May 10 03:34:48.673221 kernel: audit: type=1400 audit(1746848088.670:562): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.682550 kernel: audit: type=1400 audit(1746848088.670:563): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.682597 kernel: audit: type=1400 audit(1746848088.670:564): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.687057 kernel: audit: type=1400 audit(1746848088.670:565): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691562 kernel: audit: type=1400 audit(1746848088.670:566): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.696167 kernel: audit: type=1400 audit(1746848088.670:567): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705529 kernel: audit: type=1400 audit(1746848088.670:568): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705567 kernel: audit: type=1400 audit(1746848088.670:569): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.714530 kernel: audit: type=1400 audit(1746848088.670:570): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.714575 kernel: audit: type=1400 audit(1746848088.677:571): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit: BPF prog-id=82 op=LOAD May 10 03:34:48.677000 audit: BPF prog-id=43 op=UNLOAD May 10 03:34:48.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit: BPF prog-id=83 op=LOAD May 10 03:34:48.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit: BPF prog-id=84 op=LOAD May 10 03:34:48.691000 audit: BPF prog-id=44 op=UNLOAD May 10 03:34:48.691000 audit: BPF prog-id=45 op=UNLOAD May 10 03:34:48.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit: BPF prog-id=85 op=LOAD May 10 03:34:48.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.705000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.719000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.719000 audit: BPF prog-id=86 op=LOAD May 10 03:34:48.719000 audit: BPF prog-id=46 op=UNLOAD May 10 03:34:48.719000 audit: BPF prog-id=47 op=UNLOAD May 10 03:34:48.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.720000 audit: BPF prog-id=87 op=LOAD May 10 03:34:48.720000 audit: BPF prog-id=48 op=UNLOAD May 10 03:34:48.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit: BPF prog-id=88 op=LOAD May 10 03:34:48.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.721000 audit: BPF prog-id=89 op=LOAD May 10 03:34:48.722000 audit: BPF prog-id=49 op=UNLOAD May 10 03:34:48.722000 audit: BPF prog-id=50 op=UNLOAD May 10 03:34:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.723000 audit: BPF prog-id=90 op=LOAD May 10 03:34:48.723000 audit: BPF prog-id=62 op=UNLOAD May 10 03:34:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit: BPF prog-id=91 op=LOAD May 10 03:34:48.725000 audit: BPF prog-id=74 op=UNLOAD May 10 03:34:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit: BPF prog-id=92 op=LOAD May 10 03:34:48.726000 audit: BPF prog-id=51 op=UNLOAD May 10 03:34:48.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.726000 audit: BPF prog-id=93 op=LOAD May 10 03:34:48.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit: BPF prog-id=94 op=LOAD May 10 03:34:48.727000 audit: BPF prog-id=52 op=UNLOAD May 10 03:34:48.727000 audit: BPF prog-id=53 op=UNLOAD May 10 03:34:48.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.728000 audit: BPF prog-id=95 op=LOAD May 10 03:34:48.728000 audit: BPF prog-id=54 op=UNLOAD May 10 03:34:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.729000 audit: BPF prog-id=96 op=LOAD May 10 03:34:48.730000 audit: BPF prog-id=78 op=UNLOAD May 10 03:34:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.731000 audit: BPF prog-id=97 op=LOAD May 10 03:34:48.731000 audit: BPF prog-id=55 op=UNLOAD May 10 03:34:48.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.732000 audit: BPF prog-id=98 op=LOAD May 10 03:34:48.732000 audit: BPF prog-id=70 op=UNLOAD May 10 03:34:48.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.734000 audit: BPF prog-id=99 op=LOAD May 10 03:34:48.734000 audit: BPF prog-id=56 op=UNLOAD May 10 03:34:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.735000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.735000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.736000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.736000 audit: BPF prog-id=100 op=LOAD May 10 03:34:48.736000 audit: BPF prog-id=66 op=UNLOAD May 10 03:34:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.737000 audit: BPF prog-id=101 op=LOAD May 10 03:34:48.737000 audit: BPF prog-id=58 op=UNLOAD May 10 03:34:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.738000 audit: BPF prog-id=102 op=LOAD May 10 03:34:48.738000 audit: BPF prog-id=57 op=UNLOAD May 10 03:34:48.758409 kubelet[1692]: E0510 03:34:48.753668 1692 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{ci-3510-3-7-n-13802d7031.novalocal.183e0d134fcb8f6e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510-3-7-n-13802d7031.novalocal,UID:ci-3510-3-7-n-13802d7031.novalocal,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510-3-7-n-13802d7031.novalocal,},FirstTimestamp:2025-05-10 03:34:42.060611438 +0000 UTC m=+1.260888763,LastTimestamp:2025-05-10 03:34:42.060611438 +0000 UTC m=+1.260888763,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510-3-7-n-13802d7031.novalocal,}" May 10 03:34:48.753953 systemd[1]: Stopping kubelet.service... May 10 03:34:48.777523 systemd[1]: kubelet.service: Deactivated successfully. May 10 03:34:48.777688 systemd[1]: Stopped kubelet.service. May 10 03:34:48.777741 systemd[1]: kubelet.service: Consumed 1.463s CPU time. May 10 03:34:48.776000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:48.779600 systemd[1]: Starting kubelet.service... May 10 03:34:48.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:48.864446 systemd[1]: Started kubelet.service. May 10 03:34:48.933028 kubelet[2031]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 03:34:48.933345 kubelet[2031]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 10 03:34:48.933404 kubelet[2031]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 10 03:34:48.933524 kubelet[2031]: I0510 03:34:48.933501 2031 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 10 03:34:48.940899 kubelet[2031]: I0510 03:34:48.940876 2031 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 10 03:34:48.941030 kubelet[2031]: I0510 03:34:48.941020 2031 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 10 03:34:48.941296 kubelet[2031]: I0510 03:34:48.941262 2031 server.go:927] "Client rotation is on, will bootstrap in background" May 10 03:34:48.942697 kubelet[2031]: I0510 03:34:48.942684 2031 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 10 03:34:48.944245 kubelet[2031]: I0510 03:34:48.944232 2031 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 10 03:34:48.965435 kubelet[2031]: I0510 03:34:48.965412 2031 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 10 03:34:48.965747 kubelet[2031]: I0510 03:34:48.965719 2031 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 10 03:34:48.966012 kubelet[2031]: I0510 03:34:48.965819 2031 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510-3-7-n-13802d7031.novalocal","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 10 03:34:48.966154 kubelet[2031]: I0510 03:34:48.966143 2031 topology_manager.go:138] "Creating topology manager with none policy" May 10 03:34:48.966222 kubelet[2031]: I0510 03:34:48.966213 2031 container_manager_linux.go:301] "Creating device plugin manager" May 10 03:34:48.966331 kubelet[2031]: I0510 03:34:48.966320 2031 state_mem.go:36] "Initialized new in-memory state store" May 10 03:34:48.966485 kubelet[2031]: I0510 03:34:48.966476 2031 kubelet.go:400] "Attempting to sync node with API server" May 10 03:34:48.966870 kubelet[2031]: I0510 03:34:48.966858 2031 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 10 03:34:48.966966 kubelet[2031]: I0510 03:34:48.966957 2031 kubelet.go:312] "Adding apiserver pod source" May 10 03:34:48.971386 kubelet[2031]: I0510 03:34:48.971372 2031 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 10 03:34:48.972491 kubelet[2031]: I0510 03:34:48.972477 2031 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 10 03:34:48.972694 kubelet[2031]: I0510 03:34:48.972682 2031 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 10 03:34:48.973085 kubelet[2031]: I0510 03:34:48.973072 2031 server.go:1264] "Started kubelet" May 10 03:34:48.973000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.973000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 03:34:48.973000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b452c0 a1=c000a7f068 a2=c000b45290 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:48.973000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 03:34:48.976490 kubelet[2031]: I0510 03:34:48.974928 2031 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 10 03:34:48.975000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:48.975000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 03:34:48.975000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003e9ec0 a1=c000a7f080 a2=c000b45350 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:48.975000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 03:34:48.976797 kubelet[2031]: I0510 03:34:48.976608 2031 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 10 03:34:48.976861 kubelet[2031]: I0510 03:34:48.976853 2031 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 10 03:34:48.978007 kubelet[2031]: E0510 03:34:48.977991 2031 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 10 03:34:48.979460 kubelet[2031]: I0510 03:34:48.979436 2031 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 10 03:34:48.980949 kubelet[2031]: I0510 03:34:48.980933 2031 server.go:455] "Adding debug handlers to kubelet server" May 10 03:34:48.981897 kubelet[2031]: I0510 03:34:48.981858 2031 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 10 03:34:48.982116 kubelet[2031]: I0510 03:34:48.982092 2031 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 10 03:34:48.986187 kubelet[2031]: I0510 03:34:48.986174 2031 volume_manager.go:291] "Starting Kubelet Volume Manager" May 10 03:34:48.986525 kubelet[2031]: I0510 03:34:48.986510 2031 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 10 03:34:48.986696 kubelet[2031]: I0510 03:34:48.986685 2031 reconciler.go:26] "Reconciler: start to sync state" May 10 03:34:48.988882 kubelet[2031]: I0510 03:34:48.988864 2031 factory.go:221] Registration of the systemd container factory successfully May 10 03:34:48.989810 kubelet[2031]: I0510 03:34:48.989790 2031 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 10 03:34:48.992160 kubelet[2031]: I0510 03:34:48.992146 2031 factory.go:221] Registration of the containerd container factory successfully May 10 03:34:48.999124 kubelet[2031]: I0510 03:34:48.999096 2031 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 10 03:34:49.002170 kubelet[2031]: I0510 03:34:49.002155 2031 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 10 03:34:49.002268 kubelet[2031]: I0510 03:34:49.002258 2031 status_manager.go:217] "Starting to sync pod status with apiserver" May 10 03:34:49.002363 kubelet[2031]: I0510 03:34:49.002353 2031 kubelet.go:2337] "Starting kubelet main sync loop" May 10 03:34:49.002467 kubelet[2031]: E0510 03:34:49.002450 2031 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 10 03:34:49.057486 kubelet[2031]: I0510 03:34:49.057455 2031 cpu_manager.go:214] "Starting CPU manager" policy="none" May 10 03:34:49.057486 kubelet[2031]: I0510 03:34:49.057473 2031 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 10 03:34:49.057486 kubelet[2031]: I0510 03:34:49.057489 2031 state_mem.go:36] "Initialized new in-memory state store" May 10 03:34:49.057672 kubelet[2031]: I0510 03:34:49.057624 2031 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 10 03:34:49.057672 kubelet[2031]: I0510 03:34:49.057636 2031 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 10 03:34:49.057672 kubelet[2031]: I0510 03:34:49.057653 2031 policy_none.go:49] "None policy: Start" May 10 03:34:49.058361 kubelet[2031]: I0510 03:34:49.058344 2031 memory_manager.go:170] "Starting memorymanager" policy="None" May 10 03:34:49.058424 kubelet[2031]: I0510 03:34:49.058378 2031 state_mem.go:35] "Initializing new in-memory state store" May 10 03:34:49.058557 kubelet[2031]: I0510 03:34:49.058531 2031 state_mem.go:75] "Updated machine memory state" May 10 03:34:49.062246 kubelet[2031]: I0510 03:34:49.062227 2031 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 10 03:34:49.060000 audit[2031]: AVC avc: denied { mac_admin } for pid=2031 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:34:49.060000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 10 03:34:49.060000 audit[2031]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f5f020 a1=c000d61860 a2=c000f5eff0 a3=25 items=0 ppid=1 pid=2031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:34:49.060000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 10 03:34:49.062537 kubelet[2031]: I0510 03:34:49.062321 2031 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 10 03:34:49.062537 kubelet[2031]: I0510 03:34:49.062462 2031 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 10 03:34:49.062591 kubelet[2031]: I0510 03:34:49.062543 2031 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 10 03:34:49.089299 kubelet[2031]: I0510 03:34:49.089261 2031 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.103293 kubelet[2031]: I0510 03:34:49.103242 2031 topology_manager.go:215] "Topology Admit Handler" podUID="e9e3c63a3bc311a1c7f24440ff658b67" podNamespace="kube-system" podName="kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.103553 kubelet[2031]: I0510 03:34:49.103536 2031 topology_manager.go:215] "Topology Admit Handler" podUID="9e6cd737a760c36fc437cd67b5aec329" podNamespace="kube-system" podName="kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.103676 kubelet[2031]: I0510 03:34:49.103660 2031 topology_manager.go:215] "Topology Admit Handler" podUID="90f5301c56b167d1c40bcad92244102c" podNamespace="kube-system" podName="kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.117879 kubelet[2031]: W0510 03:34:49.117844 2031 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 03:34:49.118020 kubelet[2031]: W0510 03:34:49.117900 2031 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 03:34:49.119957 kubelet[2031]: W0510 03:34:49.119932 2031 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 03:34:49.120037 kubelet[2031]: E0510 03:34:49.119992 2031 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.126085 kubelet[2031]: I0510 03:34:49.126059 2031 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.126168 kubelet[2031]: I0510 03:34:49.126141 2031 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.197000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521006 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 10 03:34:49.197000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e1e100 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:34:49.197000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:34:49.288422 kubelet[2031]: I0510 03:34:49.288375 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-k8s-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.288422 kubelet[2031]: I0510 03:34:49.288414 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.288422 kubelet[2031]: I0510 03:34:49.288439 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/90f5301c56b167d1c40bcad92244102c-kubeconfig\") pod \"kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"90f5301c56b167d1c40bcad92244102c\") " pod="kube-system/kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.288812 kubelet[2031]: I0510 03:34:49.288459 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e9e3c63a3bc311a1c7f24440ff658b67-k8s-certs\") pod \"kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"e9e3c63a3bc311a1c7f24440ff658b67\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.288812 kubelet[2031]: I0510 03:34:49.288478 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-flexvolume-dir\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.288812 kubelet[2031]: I0510 03:34:49.288498 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-ca-certs\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.288812 kubelet[2031]: I0510 03:34:49.288517 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/9e6cd737a760c36fc437cd67b5aec329-kubeconfig\") pod \"kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"9e6cd737a760c36fc437cd67b5aec329\") " pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.288812 kubelet[2031]: I0510 03:34:49.288534 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e9e3c63a3bc311a1c7f24440ff658b67-ca-certs\") pod \"kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"e9e3c63a3bc311a1c7f24440ff658b67\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.289134 kubelet[2031]: I0510 03:34:49.288552 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e9e3c63a3bc311a1c7f24440ff658b67-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal\" (UID: \"e9e3c63a3bc311a1c7f24440ff658b67\") " pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:49.972976 kubelet[2031]: I0510 03:34:49.972885 2031 apiserver.go:52] "Watching apiserver" May 10 03:34:49.987425 kubelet[2031]: I0510 03:34:49.987352 2031 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 10 03:34:50.036567 kubelet[2031]: I0510 03:34:50.036467 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" podStartSLOduration=3.036394041 podStartE2EDuration="3.036394041s" podCreationTimestamp="2025-05-10 03:34:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 03:34:50.03622306 +0000 UTC m=+1.163518351" watchObservedRunningTime="2025-05-10 03:34:50.036394041 +0000 UTC m=+1.163689342" May 10 03:34:50.056743 kubelet[2031]: W0510 03:34:50.056021 2031 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] May 10 03:34:50.056743 kubelet[2031]: E0510 03:34:50.056103 2031 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal\" already exists" pod="kube-system/kube-apiserver-ci-3510-3-7-n-13802d7031.novalocal" May 10 03:34:50.069857 kubelet[2031]: I0510 03:34:50.069693 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510-3-7-n-13802d7031.novalocal" podStartSLOduration=1.0696748600000001 podStartE2EDuration="1.06967486s" podCreationTimestamp="2025-05-10 03:34:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 03:34:50.056895529 +0000 UTC m=+1.184190830" watchObservedRunningTime="2025-05-10 03:34:50.06967486 +0000 UTC m=+1.196970151" May 10 03:34:50.088490 kubelet[2031]: I0510 03:34:50.088177 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510-3-7-n-13802d7031.novalocal" podStartSLOduration=1.088158515 podStartE2EDuration="1.088158515s" podCreationTimestamp="2025-05-10 03:34:49 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 03:34:50.070392294 +0000 UTC m=+1.197687586" watchObservedRunningTime="2025-05-10 03:34:50.088158515 +0000 UTC m=+1.215453816" May 10 03:34:50.257000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:50.257000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cbd6a0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:34:50.257000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:34:50.259000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:50.259000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cbd8c0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:34:50.259000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:34:50.260000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:50.260000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000e83300 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:34:50.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:34:50.260000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:34:50.260000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cbda80 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:34:50.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:34:54.794773 sudo[1332]: pam_unix(sudo:session): session closed for user root May 10 03:34:54.793000 audit[1332]: USER_END pid=1332 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:54.796247 kernel: kauditd_printk_skb: 263 callbacks suppressed May 10 03:34:54.796314 kernel: audit: type=1106 audit(1746848094.793:816): pid=1332 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:54.800000 audit[1332]: CRED_DISP pid=1332 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:54.806926 kernel: audit: type=1104 audit(1746848094.800:817): pid=1332 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 10 03:34:54.996676 sshd[1329]: pam_unix(sshd:session): session closed for user core May 10 03:34:54.997000 audit[1329]: USER_END pid=1329 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:55.003378 systemd-logind[1143]: Session 9 logged out. Waiting for processes to exit. May 10 03:34:55.004971 systemd[1]: sshd@8-172.24.4.212:22-172.24.4.1:37938.service: Deactivated successfully. May 10 03:34:55.006417 systemd[1]: session-9.scope: Deactivated successfully. May 10 03:34:55.006669 systemd[1]: session-9.scope: Consumed 6.555s CPU time. May 10 03:34:55.010212 systemd-logind[1143]: Removed session 9. May 10 03:34:55.016364 kernel: audit: type=1106 audit(1746848094.997:818): pid=1329 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:55.016508 kernel: audit: type=1104 audit(1746848094.997:819): pid=1329 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:54.997000 audit[1329]: CRED_DISP pid=1329 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:34:55.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.212:22-172.24.4.1:37938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:34:55.048323 kernel: audit: type=1131 audit(1746848095.003:820): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-172.24.4.212:22-172.24.4.1:37938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:35:02.464461 kubelet[2031]: I0510 03:35:02.464399 2031 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 10 03:35:02.465193 env[1150]: time="2025-05-10T03:35:02.465133965Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 10 03:35:02.465604 kubelet[2031]: I0510 03:35:02.465528 2031 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 10 03:35:03.054215 kubelet[2031]: I0510 03:35:03.054154 2031 topology_manager.go:215] "Topology Admit Handler" podUID="98adc680-26f7-42d1-a63e-288d1b00c793" podNamespace="kube-system" podName="kube-proxy-gfbcn" May 10 03:35:03.067713 systemd[1]: Created slice kubepods-besteffort-pod98adc680_26f7_42d1_a63e_288d1b00c793.slice. May 10 03:35:03.086536 kubelet[2031]: I0510 03:35:03.086483 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/98adc680-26f7-42d1-a63e-288d1b00c793-lib-modules\") pod \"kube-proxy-gfbcn\" (UID: \"98adc680-26f7-42d1-a63e-288d1b00c793\") " pod="kube-system/kube-proxy-gfbcn" May 10 03:35:03.086673 kubelet[2031]: I0510 03:35:03.086561 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kcn6t\" (UniqueName: \"kubernetes.io/projected/98adc680-26f7-42d1-a63e-288d1b00c793-kube-api-access-kcn6t\") pod \"kube-proxy-gfbcn\" (UID: \"98adc680-26f7-42d1-a63e-288d1b00c793\") " pod="kube-system/kube-proxy-gfbcn" May 10 03:35:03.086673 kubelet[2031]: I0510 03:35:03.086617 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/98adc680-26f7-42d1-a63e-288d1b00c793-kube-proxy\") pod \"kube-proxy-gfbcn\" (UID: \"98adc680-26f7-42d1-a63e-288d1b00c793\") " pod="kube-system/kube-proxy-gfbcn" May 10 03:35:03.086673 kubelet[2031]: I0510 03:35:03.086661 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/98adc680-26f7-42d1-a63e-288d1b00c793-xtables-lock\") pod \"kube-proxy-gfbcn\" (UID: \"98adc680-26f7-42d1-a63e-288d1b00c793\") " pod="kube-system/kube-proxy-gfbcn" May 10 03:35:03.193995 kubelet[2031]: E0510 03:35:03.193971 2031 projected.go:294] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found May 10 03:35:03.194167 kubelet[2031]: E0510 03:35:03.194155 2031 projected.go:200] Error preparing data for projected volume kube-api-access-kcn6t for pod kube-system/kube-proxy-gfbcn: configmap "kube-root-ca.crt" not found May 10 03:35:03.194311 kubelet[2031]: E0510 03:35:03.194297 2031 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/98adc680-26f7-42d1-a63e-288d1b00c793-kube-api-access-kcn6t podName:98adc680-26f7-42d1-a63e-288d1b00c793 nodeName:}" failed. No retries permitted until 2025-05-10 03:35:03.694249398 +0000 UTC m=+14.821544689 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-kcn6t" (UniqueName: "kubernetes.io/projected/98adc680-26f7-42d1-a63e-288d1b00c793-kube-api-access-kcn6t") pod "kube-proxy-gfbcn" (UID: "98adc680-26f7-42d1-a63e-288d1b00c793") : configmap "kube-root-ca.crt" not found May 10 03:35:03.525358 kubelet[2031]: I0510 03:35:03.525244 2031 topology_manager.go:215] "Topology Admit Handler" podUID="faa96590-943c-419b-9d8d-b288be5d9394" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-4m69g" May 10 03:35:03.530566 systemd[1]: Created slice kubepods-besteffort-podfaa96590_943c_419b_9d8d_b288be5d9394.slice. May 10 03:35:03.536946 kubelet[2031]: W0510 03:35:03.536896 2031 reflector.go:547] object-"tigera-operator"/"kubernetes-services-endpoint": failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510-3-7-n-13802d7031.novalocal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-7-n-13802d7031.novalocal' and this object May 10 03:35:03.536946 kubelet[2031]: E0510 03:35:03.536950 2031 reflector.go:150] object-"tigera-operator"/"kubernetes-services-endpoint": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kubernetes-services-endpoint" is forbidden: User "system:node:ci-3510-3-7-n-13802d7031.novalocal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-7-n-13802d7031.novalocal' and this object May 10 03:35:03.537152 kubelet[2031]: W0510 03:35:03.536921 2031 reflector.go:547] object-"tigera-operator"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-7-n-13802d7031.novalocal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-7-n-13802d7031.novalocal' and this object May 10 03:35:03.537224 kubelet[2031]: E0510 03:35:03.537212 2031 reflector.go:150] object-"tigera-operator"/"kube-root-ca.crt": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510-3-7-n-13802d7031.novalocal" cannot list resource "configmaps" in API group "" in the namespace "tigera-operator": no relationship found between node 'ci-3510-3-7-n-13802d7031.novalocal' and this object May 10 03:35:03.590245 kubelet[2031]: I0510 03:35:03.590199 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mtvqt\" (UniqueName: \"kubernetes.io/projected/faa96590-943c-419b-9d8d-b288be5d9394-kube-api-access-mtvqt\") pod \"tigera-operator-797db67f8-4m69g\" (UID: \"faa96590-943c-419b-9d8d-b288be5d9394\") " pod="tigera-operator/tigera-operator-797db67f8-4m69g" May 10 03:35:03.590411 kubelet[2031]: I0510 03:35:03.590245 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/faa96590-943c-419b-9d8d-b288be5d9394-var-lib-calico\") pod \"tigera-operator-797db67f8-4m69g\" (UID: \"faa96590-943c-419b-9d8d-b288be5d9394\") " pod="tigera-operator/tigera-operator-797db67f8-4m69g" May 10 03:35:03.978317 env[1150]: time="2025-05-10T03:35:03.978171596Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gfbcn,Uid:98adc680-26f7-42d1-a63e-288d1b00c793,Namespace:kube-system,Attempt:0,}" May 10 03:35:04.018208 env[1150]: time="2025-05-10T03:35:04.017981501Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:04.018963 env[1150]: time="2025-05-10T03:35:04.018776141Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:04.019686 env[1150]: time="2025-05-10T03:35:04.019214833Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:04.020930 env[1150]: time="2025-05-10T03:35:04.020743811Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/889bc91766eec11395f07491eb467562dfdc4c51229186f9ac1f52ccc267a30c pid=2114 runtime=io.containerd.runc.v2 May 10 03:35:04.061546 systemd[1]: Started cri-containerd-889bc91766eec11395f07491eb467562dfdc4c51229186f9ac1f52ccc267a30c.scope. May 10 03:35:04.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.095204 kernel: audit: type=1400 audit(1746848104.084:821): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.095285 kernel: audit: type=1400 audit(1746848104.084:822): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.095310 kernel: audit: type=1400 audit(1746848104.084:823): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.099635 kernel: audit: type=1400 audit(1746848104.084:824): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.108796 kernel: audit: type=1400 audit(1746848104.084:825): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.108849 kernel: audit: type=1400 audit(1746848104.084:826): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.121918 kernel: audit: type=1400 audit(1746848104.084:827): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.121963 kernel: audit: type=1400 audit(1746848104.084:828): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.131154 kernel: audit: type=1400 audit(1746848104.084:829): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.131197 kernel: audit: type=1400 audit(1746848104.084:830): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.084000 audit: BPF prog-id=103 op=LOAD May 10 03:35:04.089000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2114 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396263393137363665656331313339356630373439316562343637 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2114 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396263393137363665656331313339356630373439316562343637 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.089000 audit: BPF prog-id=104 op=LOAD May 10 03:35:04.089000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000375110 items=0 ppid=2114 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396263393137363665656331313339356630373439316562343637 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.103000 audit: BPF prog-id=105 op=LOAD May 10 03:35:04.103000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000375158 items=0 ppid=2114 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396263393137363665656331313339356630373439316562343637 May 10 03:35:04.113000 audit: BPF prog-id=105 op=UNLOAD May 10 03:35:04.113000 audit: BPF prog-id=104 op=UNLOAD May 10 03:35:04.113000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { perfmon } for pid=2125 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit[2125]: AVC avc: denied { bpf } for pid=2125 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.113000 audit: BPF prog-id=106 op=LOAD May 10 03:35:04.113000 audit[2125]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000375568 items=0 ppid=2114 pid=2125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.113000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838396263393137363665656331313339356630373439316562343637 May 10 03:35:04.149335 env[1150]: time="2025-05-10T03:35:04.149297824Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-gfbcn,Uid:98adc680-26f7-42d1-a63e-288d1b00c793,Namespace:kube-system,Attempt:0,} returns sandbox id \"889bc91766eec11395f07491eb467562dfdc4c51229186f9ac1f52ccc267a30c\"" May 10 03:35:04.153243 env[1150]: time="2025-05-10T03:35:04.153209309Z" level=info msg="CreateContainer within sandbox \"889bc91766eec11395f07491eb467562dfdc4c51229186f9ac1f52ccc267a30c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 10 03:35:04.180624 env[1150]: time="2025-05-10T03:35:04.180572311Z" level=info msg="CreateContainer within sandbox \"889bc91766eec11395f07491eb467562dfdc4c51229186f9ac1f52ccc267a30c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"292b5cac08adf6511a52b4d01fa5d78cb56967de99b3882d7b9ab619439d86a6\"" May 10 03:35:04.182331 env[1150]: time="2025-05-10T03:35:04.182302356Z" level=info msg="StartContainer for \"292b5cac08adf6511a52b4d01fa5d78cb56967de99b3882d7b9ab619439d86a6\"" May 10 03:35:04.198187 systemd[1]: Started cri-containerd-292b5cac08adf6511a52b4d01fa5d78cb56967de99b3882d7b9ab619439d86a6.scope. May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ffae606e2f8 items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326235636163303861646636353131613532623464303166613564 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit: BPF prog-id=107 op=LOAD May 10 03:35:04.214000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024de8 items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326235636163303861646636353131613532623464303166613564 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit: BPF prog-id=108 op=LOAD May 10 03:35:04.214000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024e38 items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326235636163303861646636353131613532623464303166613564 May 10 03:35:04.214000 audit: BPF prog-id=108 op=UNLOAD May 10 03:35:04.214000 audit: BPF prog-id=107 op=UNLOAD May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.214000 audit: BPF prog-id=109 op=LOAD May 10 03:35:04.214000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024ec8 items=0 ppid=2114 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326235636163303861646636353131613532623464303166613564 May 10 03:35:04.235515 env[1150]: time="2025-05-10T03:35:04.235385089Z" level=info msg="StartContainer for \"292b5cac08adf6511a52b4d01fa5d78cb56967de99b3882d7b9ab619439d86a6\" returns successfully" May 10 03:35:04.291000 audit[2205]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.291000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1cbcfd10 a2=0 a3=7ffe1cbcfcfc items=0 ppid=2165 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 03:35:04.294000 audit[2206]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.294000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe01c2d00 a2=0 a3=7fffe01c2cec items=0 ppid=2165 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.294000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 10 03:35:04.297000 audit[2207]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.297000 audit[2207]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5ab1b150 a2=0 a3=7ffc5ab1b13c items=0 ppid=2165 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 03:35:04.303000 audit[2209]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.303000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe75397960 a2=0 a3=7ffe7539794c items=0 ppid=2165 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.303000 audit[2208]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.303000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe29c55950 a2=0 a3=7ffe29c5593c items=0 ppid=2165 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 10 03:35:04.303000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 03:35:04.305000 audit[2211]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.305000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd009cbec0 a2=0 a3=7ffd009cbeac items=0 ppid=2165 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 10 03:35:04.395000 audit[2212]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.395000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff101553d0 a2=0 a3=7fff101553bc items=0 ppid=2165 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.395000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 03:35:04.401000 audit[2214]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.401000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffea96b8cf0 a2=0 a3=7ffea96b8cdc items=0 ppid=2165 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 10 03:35:04.409000 audit[2217]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.409000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc660707d0 a2=0 a3=7ffc660707bc items=0 ppid=2165 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 10 03:35:04.411000 audit[2218]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.411000 audit[2218]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2499abf0 a2=0 a3=7fff2499abdc items=0 ppid=2165 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.411000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 03:35:04.417000 audit[2220]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.417000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcf58ea800 a2=0 a3=7ffcf58ea7ec items=0 ppid=2165 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 03:35:04.420000 audit[2221]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.420000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd2bd51c60 a2=0 a3=7ffd2bd51c4c items=0 ppid=2165 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 03:35:04.423000 audit[2223]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.423000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff694f4280 a2=0 a3=7fff694f426c items=0 ppid=2165 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 03:35:04.429000 audit[2226]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.429000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe79bf2b70 a2=0 a3=7ffe79bf2b5c items=0 ppid=2165 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.429000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 10 03:35:04.431000 audit[2227]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.431000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffca43229c0 a2=0 a3=7ffca43229ac items=0 ppid=2165 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 03:35:04.436000 audit[2229]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.436000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd47933ff0 a2=0 a3=7ffd47933fdc items=0 ppid=2165 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.436000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 03:35:04.438000 audit[2230]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.438000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffce3d00be0 a2=0 a3=7ffce3d00bcc items=0 ppid=2165 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.438000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 03:35:04.440000 audit[2232]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.440000 audit[2232]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd02047900 a2=0 a3=7ffd020478ec items=0 ppid=2165 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 03:35:04.447000 audit[2235]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.447000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcb3464d10 a2=0 a3=7ffcb3464cfc items=0 ppid=2165 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.447000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 03:35:04.452000 audit[2238]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.452000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc875bf670 a2=0 a3=7ffc875bf65c items=0 ppid=2165 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.452000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 03:35:04.454000 audit[2239]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.454000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe4350c4a0 a2=0 a3=7ffe4350c48c items=0 ppid=2165 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 03:35:04.457000 audit[2241]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.457000 audit[2241]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffeb2d80ce0 a2=0 a3=7ffeb2d80ccc items=0 ppid=2165 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 03:35:04.462000 audit[2244]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.462000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd27ab9970 a2=0 a3=7ffd27ab995c items=0 ppid=2165 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 03:35:04.463000 audit[2245]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.463000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdfabb51d0 a2=0 a3=7ffdfabb51bc items=0 ppid=2165 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 03:35:04.466000 audit[2247]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 10 03:35:04.466000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7fffdfcccba0 a2=0 a3=7fffdfcccb8c items=0 ppid=2165 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.466000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 03:35:04.498000 audit[2253]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:04.498000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff117a50c0 a2=0 a3=7fff117a50ac items=0 ppid=2165 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.498000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:04.511000 audit[2253]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:04.511000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff117a50c0 a2=0 a3=7fff117a50ac items=0 ppid=2165 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.511000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:04.513000 audit[2259]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2259 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.513000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff4b436a40 a2=0 a3=7fff4b436a2c items=0 ppid=2165 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 10 03:35:04.519000 audit[2261]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2261 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.519000 audit[2261]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fffaa3bb090 a2=0 a3=7fffaa3bb07c items=0 ppid=2165 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 10 03:35:04.523000 audit[2264]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.523000 audit[2264]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd72da4290 a2=0 a3=7ffd72da427c items=0 ppid=2165 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.523000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 10 03:35:04.524000 audit[2265]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2265 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.524000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb993f2f0 a2=0 a3=7ffcb993f2dc items=0 ppid=2165 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 10 03:35:04.527000 audit[2267]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.527000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd32b6d2c0 a2=0 a3=7ffd32b6d2ac items=0 ppid=2165 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 10 03:35:04.528000 audit[2268]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.528000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff390d0830 a2=0 a3=7fff390d081c items=0 ppid=2165 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.528000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 10 03:35:04.531000 audit[2270]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.531000 audit[2270]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe4c304e30 a2=0 a3=7ffe4c304e1c items=0 ppid=2165 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 10 03:35:04.535000 audit[2273]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.535000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffde0cc0850 a2=0 a3=7ffde0cc083c items=0 ppid=2165 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.535000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 10 03:35:04.536000 audit[2274]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2274 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.536000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8770f840 a2=0 a3=7ffd8770f82c items=0 ppid=2165 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 10 03:35:04.539000 audit[2276]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.539000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffdc28a060 a2=0 a3=7fffdc28a04c items=0 ppid=2165 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.539000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 10 03:35:04.543000 audit[2277]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.543000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1a0b80d0 a2=0 a3=7ffd1a0b80bc items=0 ppid=2165 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 10 03:35:04.545000 audit[2279]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.545000 audit[2279]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffffae25e20 a2=0 a3=7ffffae25e0c items=0 ppid=2165 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 10 03:35:04.552000 audit[2282]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.552000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcce989d40 a2=0 a3=7ffcce989d2c items=0 ppid=2165 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 10 03:35:04.559000 audit[2285]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.559000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5c3fd9b0 a2=0 a3=7ffc5c3fd99c items=0 ppid=2165 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 10 03:35:04.560000 audit[2286]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.560000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd0fcf3f60 a2=0 a3=7ffd0fcf3f4c items=0 ppid=2165 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 10 03:35:04.565000 audit[2288]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.565000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff01dcf7b0 a2=0 a3=7fff01dcf79c items=0 ppid=2165 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.565000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 03:35:04.574000 audit[2291]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.574000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd9dc0aa80 a2=0 a3=7ffd9dc0aa6c items=0 ppid=2165 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 10 03:35:04.576000 audit[2292]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2292 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.576000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9cf2d000 a2=0 a3=7ffe9cf2cfec items=0 ppid=2165 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 10 03:35:04.580000 audit[2294]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.580000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffc7bfddb30 a2=0 a3=7ffc7bfddb1c items=0 ppid=2165 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 10 03:35:04.581000 audit[2295]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.581000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe98710590 a2=0 a3=7ffe9871057c items=0 ppid=2165 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.581000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 10 03:35:04.584000 audit[2297]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.584000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe18063730 a2=0 a3=7ffe1806371c items=0 ppid=2165 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.584000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 03:35:04.588000 audit[2300]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 10 03:35:04.588000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdfa5553f0 a2=0 a3=7ffdfa5553dc items=0 ppid=2165 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 10 03:35:04.597000 audit[2303]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 03:35:04.597000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe68d97700 a2=0 a3=7ffe68d976ec items=0 ppid=2165 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.597000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:04.598000 audit[2303]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 10 03:35:04.598000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe68d97700 a2=0 a3=7ffe68d976ec items=0 ppid=2165 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.598000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:04.735102 env[1150]: time="2025-05-10T03:35:04.735066694Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-4m69g,Uid:faa96590-943c-419b-9d8d-b288be5d9394,Namespace:tigera-operator,Attempt:0,}" May 10 03:35:04.758482 env[1150]: time="2025-05-10T03:35:04.757204108Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:04.758482 env[1150]: time="2025-05-10T03:35:04.757237992Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:04.758482 env[1150]: time="2025-05-10T03:35:04.757250986Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:04.758482 env[1150]: time="2025-05-10T03:35:04.757381380Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba67067295dd145da11a194280ba0e1c26571ae10241ee79a1a6ffb3074a434b pid=2312 runtime=io.containerd.runc.v2 May 10 03:35:04.788197 systemd[1]: Started cri-containerd-ba67067295dd145da11a194280ba0e1c26571ae10241ee79a1a6ffb3074a434b.scope. May 10 03:35:04.814092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3637671837.mount: Deactivated successfully. May 10 03:35:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.823000 audit: BPF prog-id=110 op=LOAD May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730363732393564643134356461313161313934323830626130 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730363732393564643134356461313161313934323830626130 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit: BPF prog-id=111 op=LOAD May 10 03:35:04.824000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c2e50 items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730363732393564643134356461313161313934323830626130 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit: BPF prog-id=112 op=LOAD May 10 03:35:04.824000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c2e98 items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730363732393564643134356461313161313934323830626130 May 10 03:35:04.824000 audit: BPF prog-id=112 op=UNLOAD May 10 03:35:04.824000 audit: BPF prog-id=111 op=UNLOAD May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { perfmon } for pid=2322 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit[2322]: AVC avc: denied { bpf } for pid=2322 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:04.824000 audit: BPF prog-id=113 op=LOAD May 10 03:35:04.824000 audit[2322]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002c32a8 items=0 ppid=2312 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:04.824000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261363730363732393564643134356461313161313934323830626130 May 10 03:35:04.850642 env[1150]: time="2025-05-10T03:35:04.850607344Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-4m69g,Uid:faa96590-943c-419b-9d8d-b288be5d9394,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"ba67067295dd145da11a194280ba0e1c26571ae10241ee79a1a6ffb3074a434b\"" May 10 03:35:04.853605 env[1150]: time="2025-05-10T03:35:04.853582322Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 10 03:35:06.238917 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2306172601.mount: Deactivated successfully. May 10 03:35:07.531787 env[1150]: time="2025-05-10T03:35:07.531711858Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:07.537039 env[1150]: time="2025-05-10T03:35:07.534928470Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:07.541146 env[1150]: time="2025-05-10T03:35:07.541093321Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:07.543448 env[1150]: time="2025-05-10T03:35:07.543395889Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:07.544179 env[1150]: time="2025-05-10T03:35:07.544128082Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 10 03:35:07.549512 env[1150]: time="2025-05-10T03:35:07.549212267Z" level=info msg="CreateContainer within sandbox \"ba67067295dd145da11a194280ba0e1c26571ae10241ee79a1a6ffb3074a434b\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 10 03:35:07.575692 env[1150]: time="2025-05-10T03:35:07.575590975Z" level=info msg="CreateContainer within sandbox \"ba67067295dd145da11a194280ba0e1c26571ae10241ee79a1a6ffb3074a434b\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"b7f9d730830331db55e6f9d03900b0f187fa329a012fd439b9df079215ab83e5\"" May 10 03:35:07.577647 env[1150]: time="2025-05-10T03:35:07.577585435Z" level=info msg="StartContainer for \"b7f9d730830331db55e6f9d03900b0f187fa329a012fd439b9df079215ab83e5\"" May 10 03:35:07.620191 systemd[1]: run-containerd-runc-k8s.io-b7f9d730830331db55e6f9d03900b0f187fa329a012fd439b9df079215ab83e5-runc.NrsERT.mount: Deactivated successfully. May 10 03:35:07.622230 systemd[1]: Started cri-containerd-b7f9d730830331db55e6f9d03900b0f187fa329a012fd439b9df079215ab83e5.scope. May 10 03:35:07.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit: BPF prog-id=114 op=LOAD May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2312 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:07.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964373330383330333331646235356536663964303339303062 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2312 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:07.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964373330383330333331646235356536663964303339303062 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit: BPF prog-id=115 op=LOAD May 10 03:35:07.632000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000169940 items=0 ppid=2312 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:07.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964373330383330333331646235356536663964303339303062 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.632000 audit: BPF prog-id=116 op=LOAD May 10 03:35:07.632000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000169988 items=0 ppid=2312 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:07.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964373330383330333331646235356536663964303339303062 May 10 03:35:07.632000 audit: BPF prog-id=116 op=UNLOAD May 10 03:35:07.632000 audit: BPF prog-id=115 op=UNLOAD May 10 03:35:07.633000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { perfmon } for pid=2352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit[2352]: AVC avc: denied { bpf } for pid=2352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:07.633000 audit: BPF prog-id=117 op=LOAD May 10 03:35:07.633000 audit[2352]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000169d98 items=0 ppid=2312 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:07.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237663964373330383330333331646235356536663964303339303062 May 10 03:35:07.650440 env[1150]: time="2025-05-10T03:35:07.650383614Z" level=info msg="StartContainer for \"b7f9d730830331db55e6f9d03900b0f187fa329a012fd439b9df079215ab83e5\" returns successfully" May 10 03:35:08.106456 kubelet[2031]: I0510 03:35:08.106411 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-gfbcn" podStartSLOduration=5.106363066 podStartE2EDuration="5.106363066s" podCreationTimestamp="2025-05-10 03:35:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 03:35:05.108495534 +0000 UTC m=+16.235790875" watchObservedRunningTime="2025-05-10 03:35:08.106363066 +0000 UTC m=+19.233658357" May 10 03:35:10.585000 audit[2387]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:10.588717 kernel: kauditd_printk_skb: 357 callbacks suppressed May 10 03:35:10.588784 kernel: audit: type=1325 audit(1746848110.585:932): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:10.585000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffa3d212b0 a2=0 a3=7fffa3d2129c items=0 ppid=2165 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:10.599661 kernel: audit: type=1300 audit(1746848110.585:932): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffa3d212b0 a2=0 a3=7fffa3d2129c items=0 ppid=2165 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:10.585000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:10.603321 kernel: audit: type=1327 audit(1746848110.585:932): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:10.604000 audit[2387]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:10.604000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa3d212b0 a2=0 a3=0 items=0 ppid=2165 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:10.616338 kernel: audit: type=1325 audit(1746848110.604:933): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:10.616390 kernel: audit: type=1300 audit(1746848110.604:933): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffa3d212b0 a2=0 a3=0 items=0 ppid=2165 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:10.618305 kernel: audit: type=1327 audit(1746848110.604:933): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:10.604000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:10.626000 audit[2389]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:10.626000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffccadf5b50 a2=0 a3=7ffccadf5b3c items=0 ppid=2165 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:10.639190 kernel: audit: type=1325 audit(1746848110.626:934): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:10.639317 kernel: audit: type=1300 audit(1746848110.626:934): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffccadf5b50 a2=0 a3=7ffccadf5b3c items=0 ppid=2165 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:10.626000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:10.643298 kernel: audit: type=1327 audit(1746848110.626:934): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:10.638000 audit[2389]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:10.649306 kernel: audit: type=1325 audit(1746848110.638:935): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:10.638000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffccadf5b50 a2=0 a3=0 items=0 ppid=2165 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:10.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:10.760331 kubelet[2031]: I0510 03:35:10.760254 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-4m69g" podStartSLOduration=5.066433252 podStartE2EDuration="7.760234856s" podCreationTimestamp="2025-05-10 03:35:03 +0000 UTC" firstStartedPulling="2025-05-10 03:35:04.851849854 +0000 UTC m=+15.979145145" lastFinishedPulling="2025-05-10 03:35:07.545651408 +0000 UTC m=+18.672946749" observedRunningTime="2025-05-10 03:35:08.107113554 +0000 UTC m=+19.234408855" watchObservedRunningTime="2025-05-10 03:35:10.760234856 +0000 UTC m=+21.887530167" May 10 03:35:10.760733 kubelet[2031]: I0510 03:35:10.760503 2031 topology_manager.go:215] "Topology Admit Handler" podUID="0e9e445e-0011-4ea4-8da8-0d263d0c7186" podNamespace="calico-system" podName="calico-typha-679bc5b5d8-w55p8" May 10 03:35:10.771633 systemd[1]: Created slice kubepods-besteffort-pod0e9e445e_0011_4ea4_8da8_0d263d0c7186.slice. May 10 03:35:10.840755 kubelet[2031]: I0510 03:35:10.840668 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0e9e445e-0011-4ea4-8da8-0d263d0c7186-typha-certs\") pod \"calico-typha-679bc5b5d8-w55p8\" (UID: \"0e9e445e-0011-4ea4-8da8-0d263d0c7186\") " pod="calico-system/calico-typha-679bc5b5d8-w55p8" May 10 03:35:10.841044 kubelet[2031]: I0510 03:35:10.841022 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pzx8r\" (UniqueName: \"kubernetes.io/projected/0e9e445e-0011-4ea4-8da8-0d263d0c7186-kube-api-access-pzx8r\") pod \"calico-typha-679bc5b5d8-w55p8\" (UID: \"0e9e445e-0011-4ea4-8da8-0d263d0c7186\") " pod="calico-system/calico-typha-679bc5b5d8-w55p8" May 10 03:35:10.841145 kubelet[2031]: I0510 03:35:10.841129 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0e9e445e-0011-4ea4-8da8-0d263d0c7186-tigera-ca-bundle\") pod \"calico-typha-679bc5b5d8-w55p8\" (UID: \"0e9e445e-0011-4ea4-8da8-0d263d0c7186\") " pod="calico-system/calico-typha-679bc5b5d8-w55p8" May 10 03:35:10.920510 kubelet[2031]: I0510 03:35:10.920447 2031 topology_manager.go:215] "Topology Admit Handler" podUID="f15ca8bc-705d-4fa6-9a1f-d043535e58cf" podNamespace="calico-system" podName="calico-node-gbsvm" May 10 03:35:10.925713 systemd[1]: Created slice kubepods-besteffort-podf15ca8bc_705d_4fa6_9a1f_d043535e58cf.slice. May 10 03:35:10.942314 kubelet[2031]: I0510 03:35:10.942252 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-var-run-calico\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942314 kubelet[2031]: I0510 03:35:10.942317 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-var-lib-calico\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942490 kubelet[2031]: I0510 03:35:10.942359 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-policysync\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942490 kubelet[2031]: I0510 03:35:10.942378 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-tigera-ca-bundle\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942490 kubelet[2031]: I0510 03:35:10.942396 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-lib-modules\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942490 kubelet[2031]: I0510 03:35:10.942414 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-cni-net-dir\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942490 kubelet[2031]: I0510 03:35:10.942431 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tdhnk\" (UniqueName: \"kubernetes.io/projected/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-kube-api-access-tdhnk\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942626 kubelet[2031]: I0510 03:35:10.942450 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-cni-log-dir\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942626 kubelet[2031]: I0510 03:35:10.942480 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-xtables-lock\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942626 kubelet[2031]: I0510 03:35:10.942498 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-node-certs\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942626 kubelet[2031]: I0510 03:35:10.942526 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-cni-bin-dir\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:10.942626 kubelet[2031]: I0510 03:35:10.942544 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f15ca8bc-705d-4fa6-9a1f-d043535e58cf-flexvol-driver-host\") pod \"calico-node-gbsvm\" (UID: \"f15ca8bc-705d-4fa6-9a1f-d043535e58cf\") " pod="calico-system/calico-node-gbsvm" May 10 03:35:11.034820 kubelet[2031]: I0510 03:35:11.034768 2031 topology_manager.go:215] "Topology Admit Handler" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" podNamespace="calico-system" podName="csi-node-driver-xkbzj" May 10 03:35:11.035051 kubelet[2031]: E0510 03:35:11.035025 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:11.052868 kubelet[2031]: E0510 03:35:11.052824 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.053095 kubelet[2031]: W0510 03:35:11.053073 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.053214 kubelet[2031]: E0510 03:35:11.053198 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.053608 kubelet[2031]: E0510 03:35:11.053596 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.053705 kubelet[2031]: W0510 03:35:11.053692 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.053855 kubelet[2031]: E0510 03:35:11.053815 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.054057 kubelet[2031]: E0510 03:35:11.054045 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.054139 kubelet[2031]: W0510 03:35:11.054128 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.054224 kubelet[2031]: E0510 03:35:11.054212 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.054484 kubelet[2031]: E0510 03:35:11.054464 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.054550 kubelet[2031]: W0510 03:35:11.054483 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.054550 kubelet[2031]: E0510 03:35:11.054497 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.054670 kubelet[2031]: E0510 03:35:11.054650 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.054670 kubelet[2031]: W0510 03:35:11.054664 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.054752 kubelet[2031]: E0510 03:35:11.054673 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.055378 kubelet[2031]: E0510 03:35:11.055346 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.055378 kubelet[2031]: W0510 03:35:11.055359 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.055378 kubelet[2031]: E0510 03:35:11.055369 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.070421 kubelet[2031]: E0510 03:35:11.070395 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.070421 kubelet[2031]: W0510 03:35:11.070413 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.070582 kubelet[2031]: E0510 03:35:11.070431 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.075476 env[1150]: time="2025-05-10T03:35:11.075052005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-679bc5b5d8-w55p8,Uid:0e9e445e-0011-4ea4-8da8-0d263d0c7186,Namespace:calico-system,Attempt:0,}" May 10 03:35:11.100701 env[1150]: time="2025-05-10T03:35:11.100575841Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:11.102610 env[1150]: time="2025-05-10T03:35:11.102570813Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:11.102683 env[1150]: time="2025-05-10T03:35:11.102610698Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:11.102842 env[1150]: time="2025-05-10T03:35:11.102803770Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a0b1e0bfdb699d5adc92045740c04ff6511b4ca669b71fb21e251feee4be4682 pid=2409 runtime=io.containerd.runc.v2 May 10 03:35:11.125798 systemd[1]: Started cri-containerd-a0b1e0bfdb699d5adc92045740c04ff6511b4ca669b71fb21e251feee4be4682.scope. May 10 03:35:11.134899 kubelet[2031]: E0510 03:35:11.134863 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.134899 kubelet[2031]: W0510 03:35:11.134885 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.134899 kubelet[2031]: E0510 03:35:11.134904 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.135301 kubelet[2031]: E0510 03:35:11.135260 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.135301 kubelet[2031]: W0510 03:35:11.135290 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.135301 kubelet[2031]: E0510 03:35:11.135301 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.135454 kubelet[2031]: E0510 03:35:11.135436 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.135454 kubelet[2031]: W0510 03:35:11.135449 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.135540 kubelet[2031]: E0510 03:35:11.135457 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.135744 kubelet[2031]: E0510 03:35:11.135725 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.135744 kubelet[2031]: W0510 03:35:11.135739 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.135825 kubelet[2031]: E0510 03:35:11.135750 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.136047 kubelet[2031]: E0510 03:35:11.135962 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.136047 kubelet[2031]: W0510 03:35:11.135975 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.136047 kubelet[2031]: E0510 03:35:11.135984 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.136162 kubelet[2031]: E0510 03:35:11.136122 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.136162 kubelet[2031]: W0510 03:35:11.136130 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.136162 kubelet[2031]: E0510 03:35:11.136138 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.136301 kubelet[2031]: E0510 03:35:11.136261 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.136301 kubelet[2031]: W0510 03:35:11.136295 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.136389 kubelet[2031]: E0510 03:35:11.136305 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.136446 kubelet[2031]: E0510 03:35:11.136429 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.136446 kubelet[2031]: W0510 03:35:11.136442 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.136519 kubelet[2031]: E0510 03:35:11.136450 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.136618 kubelet[2031]: E0510 03:35:11.136600 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.136618 kubelet[2031]: W0510 03:35:11.136614 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.136739 kubelet[2031]: E0510 03:35:11.136623 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.136792 kubelet[2031]: E0510 03:35:11.136770 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.136792 kubelet[2031]: W0510 03:35:11.136784 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.136792 kubelet[2031]: E0510 03:35:11.136792 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.136930 kubelet[2031]: E0510 03:35:11.136913 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.136930 kubelet[2031]: W0510 03:35:11.136925 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.137014 kubelet[2031]: E0510 03:35:11.136934 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.137070 kubelet[2031]: E0510 03:35:11.137053 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.137070 kubelet[2031]: W0510 03:35:11.137066 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.137145 kubelet[2031]: E0510 03:35:11.137074 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.137221 kubelet[2031]: E0510 03:35:11.137203 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.137221 kubelet[2031]: W0510 03:35:11.137216 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.137342 kubelet[2031]: E0510 03:35:11.137225 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.137389 kubelet[2031]: E0510 03:35:11.137365 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.137389 kubelet[2031]: W0510 03:35:11.137373 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.137389 kubelet[2031]: E0510 03:35:11.137381 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.137564 kubelet[2031]: E0510 03:35:11.137501 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.137564 kubelet[2031]: W0510 03:35:11.137513 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.137564 kubelet[2031]: E0510 03:35:11.137522 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.137677 kubelet[2031]: E0510 03:35:11.137642 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.137677 kubelet[2031]: W0510 03:35:11.137650 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.137677 kubelet[2031]: E0510 03:35:11.137658 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.137851 kubelet[2031]: E0510 03:35:11.137788 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.137851 kubelet[2031]: W0510 03:35:11.137801 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.137851 kubelet[2031]: E0510 03:35:11.137809 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.137962 kubelet[2031]: E0510 03:35:11.137928 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.137962 kubelet[2031]: W0510 03:35:11.137936 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.137962 kubelet[2031]: E0510 03:35:11.137945 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.138140 kubelet[2031]: E0510 03:35:11.138062 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.138140 kubelet[2031]: W0510 03:35:11.138075 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.138140 kubelet[2031]: E0510 03:35:11.138083 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.138250 kubelet[2031]: E0510 03:35:11.138205 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.138250 kubelet[2031]: W0510 03:35:11.138213 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.138250 kubelet[2031]: E0510 03:35:11.138223 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.144743 kubelet[2031]: E0510 03:35:11.144713 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.144743 kubelet[2031]: W0510 03:35:11.144735 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.144928 kubelet[2031]: E0510 03:35:11.144755 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.144928 kubelet[2031]: I0510 03:35:11.144785 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v8nn8\" (UniqueName: \"kubernetes.io/projected/f901b9fc-1fd8-4d58-b6a2-96852a615b4b-kube-api-access-v8nn8\") pod \"csi-node-driver-xkbzj\" (UID: \"f901b9fc-1fd8-4d58-b6a2-96852a615b4b\") " pod="calico-system/csi-node-driver-xkbzj" May 10 03:35:11.144986 kubelet[2031]: E0510 03:35:11.144973 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.144986 kubelet[2031]: W0510 03:35:11.144983 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.145039 kubelet[2031]: E0510 03:35:11.144993 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.145039 kubelet[2031]: I0510 03:35:11.145008 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f901b9fc-1fd8-4d58-b6a2-96852a615b4b-varrun\") pod \"csi-node-driver-xkbzj\" (UID: \"f901b9fc-1fd8-4d58-b6a2-96852a615b4b\") " pod="calico-system/csi-node-driver-xkbzj" May 10 03:35:11.145154 kubelet[2031]: E0510 03:35:11.145133 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.145154 kubelet[2031]: W0510 03:35:11.145147 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.145237 kubelet[2031]: E0510 03:35:11.145157 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.145237 kubelet[2031]: I0510 03:35:11.145173 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f901b9fc-1fd8-4d58-b6a2-96852a615b4b-registration-dir\") pod \"csi-node-driver-xkbzj\" (UID: \"f901b9fc-1fd8-4d58-b6a2-96852a615b4b\") " pod="calico-system/csi-node-driver-xkbzj" May 10 03:35:11.145479 kubelet[2031]: E0510 03:35:11.145325 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.145479 kubelet[2031]: W0510 03:35:11.145338 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.145479 kubelet[2031]: E0510 03:35:11.145347 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.145479 kubelet[2031]: I0510 03:35:11.145363 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f901b9fc-1fd8-4d58-b6a2-96852a615b4b-kubelet-dir\") pod \"csi-node-driver-xkbzj\" (UID: \"f901b9fc-1fd8-4d58-b6a2-96852a615b4b\") " pod="calico-system/csi-node-driver-xkbzj" May 10 03:35:11.145823 kubelet[2031]: E0510 03:35:11.145688 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.145823 kubelet[2031]: W0510 03:35:11.145709 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.145823 kubelet[2031]: E0510 03:35:11.145743 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.146062 kubelet[2031]: E0510 03:35:11.145996 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.146062 kubelet[2031]: W0510 03:35:11.146007 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.146062 kubelet[2031]: E0510 03:35:11.146022 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.146326 kubelet[2031]: E0510 03:35:11.146171 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.146326 kubelet[2031]: W0510 03:35:11.146186 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.146326 kubelet[2031]: E0510 03:35:11.146201 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.146326 kubelet[2031]: I0510 03:35:11.146221 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f901b9fc-1fd8-4d58-b6a2-96852a615b4b-socket-dir\") pod \"csi-node-driver-xkbzj\" (UID: \"f901b9fc-1fd8-4d58-b6a2-96852a615b4b\") " pod="calico-system/csi-node-driver-xkbzj" May 10 03:35:11.146655 kubelet[2031]: E0510 03:35:11.146532 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.146655 kubelet[2031]: W0510 03:35:11.146543 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.146655 kubelet[2031]: E0510 03:35:11.146580 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.146942 kubelet[2031]: E0510 03:35:11.146826 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.146942 kubelet[2031]: W0510 03:35:11.146837 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.146942 kubelet[2031]: E0510 03:35:11.146864 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.147216 kubelet[2031]: E0510 03:35:11.147102 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.147216 kubelet[2031]: W0510 03:35:11.147113 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.147216 kubelet[2031]: E0510 03:35:11.147139 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.147549 kubelet[2031]: E0510 03:35:11.147341 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.147549 kubelet[2031]: W0510 03:35:11.147350 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.147549 kubelet[2031]: E0510 03:35:11.147377 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.147899 kubelet[2031]: E0510 03:35:11.147797 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.147899 kubelet[2031]: W0510 03:35:11.147808 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.147899 kubelet[2031]: E0510 03:35:11.147847 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.148183 kubelet[2031]: E0510 03:35:11.148067 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.148183 kubelet[2031]: W0510 03:35:11.148078 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.148183 kubelet[2031]: E0510 03:35:11.148087 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.148512 kubelet[2031]: E0510 03:35:11.148393 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.148512 kubelet[2031]: W0510 03:35:11.148404 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.148512 kubelet[2031]: E0510 03:35:11.148413 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.148729 kubelet[2031]: E0510 03:35:11.148682 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.148729 kubelet[2031]: W0510 03:35:11.148693 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.148729 kubelet[2031]: E0510 03:35:11.148702 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.166000 audit: BPF prog-id=118 op=LOAD May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2409 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130623165306266646236393964356164633932303435373430633034 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2409 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130623165306266646236393964356164633932303435373430633034 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit: BPF prog-id=119 op=LOAD May 10 03:35:11.167000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000224c40 items=0 ppid=2409 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130623165306266646236393964356164633932303435373430633034 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit: BPF prog-id=120 op=LOAD May 10 03:35:11.167000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000224c88 items=0 ppid=2409 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130623165306266646236393964356164633932303435373430633034 May 10 03:35:11.167000 audit: BPF prog-id=120 op=UNLOAD May 10 03:35:11.167000 audit: BPF prog-id=119 op=UNLOAD May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { perfmon } for pid=2416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit[2416]: AVC avc: denied { bpf } for pid=2416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.167000 audit: BPF prog-id=121 op=LOAD May 10 03:35:11.167000 audit[2416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000225098 items=0 ppid=2409 pid=2416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.167000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130623165306266646236393964356164633932303435373430633034 May 10 03:35:11.203661 env[1150]: time="2025-05-10T03:35:11.203618192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-679bc5b5d8-w55p8,Uid:0e9e445e-0011-4ea4-8da8-0d263d0c7186,Namespace:calico-system,Attempt:0,} returns sandbox id \"a0b1e0bfdb699d5adc92045740c04ff6511b4ca669b71fb21e251feee4be4682\"" May 10 03:35:11.205836 env[1150]: time="2025-05-10T03:35:11.205808289Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 10 03:35:11.229835 env[1150]: time="2025-05-10T03:35:11.229799642Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gbsvm,Uid:f15ca8bc-705d-4fa6-9a1f-d043535e58cf,Namespace:calico-system,Attempt:0,}" May 10 03:35:11.247500 kubelet[2031]: E0510 03:35:11.247467 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.247500 kubelet[2031]: W0510 03:35:11.247487 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.247500 kubelet[2031]: E0510 03:35:11.247506 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.248474 kubelet[2031]: E0510 03:35:11.248431 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.248474 kubelet[2031]: W0510 03:35:11.248445 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.248474 kubelet[2031]: E0510 03:35:11.248463 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.248653 kubelet[2031]: E0510 03:35:11.248635 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.248720 kubelet[2031]: W0510 03:35:11.248667 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.248720 kubelet[2031]: E0510 03:35:11.248684 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.249055 kubelet[2031]: E0510 03:35:11.249038 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.249055 kubelet[2031]: W0510 03:35:11.249051 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.249156 kubelet[2031]: E0510 03:35:11.249066 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.249233 kubelet[2031]: E0510 03:35:11.249215 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.249233 kubelet[2031]: W0510 03:35:11.249228 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.249596 kubelet[2031]: E0510 03:35:11.249369 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.249596 kubelet[2031]: E0510 03:35:11.249380 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.249596 kubelet[2031]: W0510 03:35:11.249461 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.249596 kubelet[2031]: E0510 03:35:11.249561 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.249861 kubelet[2031]: E0510 03:35:11.249792 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.249861 kubelet[2031]: W0510 03:35:11.249802 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.249861 kubelet[2031]: E0510 03:35:11.249818 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.249972 kubelet[2031]: E0510 03:35:11.249954 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.249972 kubelet[2031]: W0510 03:35:11.249964 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.250035 kubelet[2031]: E0510 03:35:11.249981 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.250614 kubelet[2031]: E0510 03:35:11.250568 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.250614 kubelet[2031]: W0510 03:35:11.250581 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.250614 kubelet[2031]: E0510 03:35:11.250596 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.250762 kubelet[2031]: E0510 03:35:11.250739 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.250762 kubelet[2031]: W0510 03:35:11.250753 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.250985 kubelet[2031]: E0510 03:35:11.250869 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.251049 kubelet[2031]: E0510 03:35:11.251041 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.251092 kubelet[2031]: W0510 03:35:11.251050 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.251170 kubelet[2031]: E0510 03:35:11.251147 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.251228 kubelet[2031]: E0510 03:35:11.251199 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.251228 kubelet[2031]: W0510 03:35:11.251208 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.251480 kubelet[2031]: E0510 03:35:11.251358 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.251658 kubelet[2031]: E0510 03:35:11.251640 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.251658 kubelet[2031]: W0510 03:35:11.251653 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.251788 kubelet[2031]: E0510 03:35:11.251757 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.251840 kubelet[2031]: E0510 03:35:11.251790 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.251840 kubelet[2031]: W0510 03:35:11.251799 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.251944 kubelet[2031]: E0510 03:35:11.251922 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.252006 kubelet[2031]: E0510 03:35:11.251994 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.252006 kubelet[2031]: W0510 03:35:11.252003 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.252071 kubelet[2031]: E0510 03:35:11.252019 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.252234 kubelet[2031]: E0510 03:35:11.252217 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.252234 kubelet[2031]: W0510 03:35:11.252230 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.252374 kubelet[2031]: E0510 03:35:11.252245 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.252412 kubelet[2031]: E0510 03:35:11.252393 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.252412 kubelet[2031]: W0510 03:35:11.252401 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.252412 kubelet[2031]: E0510 03:35:11.252411 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.252741 kubelet[2031]: E0510 03:35:11.252719 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.252741 kubelet[2031]: W0510 03:35:11.252732 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.253167 kubelet[2031]: E0510 03:35:11.252859 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.253167 kubelet[2031]: E0510 03:35:11.252866 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.253167 kubelet[2031]: W0510 03:35:11.252901 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.253167 kubelet[2031]: E0510 03:35:11.252964 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.253167 kubelet[2031]: E0510 03:35:11.253063 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.253167 kubelet[2031]: W0510 03:35:11.253072 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.253167 kubelet[2031]: E0510 03:35:11.253141 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.256052 kubelet[2031]: E0510 03:35:11.253449 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.256052 kubelet[2031]: W0510 03:35:11.253459 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.256052 kubelet[2031]: E0510 03:35:11.253491 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.256052 kubelet[2031]: E0510 03:35:11.253600 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.256052 kubelet[2031]: W0510 03:35:11.253608 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.256052 kubelet[2031]: E0510 03:35:11.253624 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.256052 kubelet[2031]: E0510 03:35:11.253835 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.256052 kubelet[2031]: W0510 03:35:11.253844 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.256052 kubelet[2031]: E0510 03:35:11.253860 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.256052 kubelet[2031]: E0510 03:35:11.254004 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.256419 kubelet[2031]: W0510 03:35:11.254012 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.256419 kubelet[2031]: E0510 03:35:11.254021 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.256593 kubelet[2031]: E0510 03:35:11.256534 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.256593 kubelet[2031]: W0510 03:35:11.256552 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.256593 kubelet[2031]: E0510 03:35:11.256566 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.263073 env[1150]: time="2025-05-10T03:35:11.262122608Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:11.263073 env[1150]: time="2025-05-10T03:35:11.262163936Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:11.263073 env[1150]: time="2025-05-10T03:35:11.262177571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:11.263073 env[1150]: time="2025-05-10T03:35:11.262341379Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335 pid=2507 runtime=io.containerd.runc.v2 May 10 03:35:11.267112 kubelet[2031]: E0510 03:35:11.267042 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:11.267112 kubelet[2031]: W0510 03:35:11.267060 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:11.267112 kubelet[2031]: E0510 03:35:11.267078 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:11.277983 systemd[1]: Started cri-containerd-23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335.scope. May 10 03:35:11.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.293000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.293000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit: BPF prog-id=122 op=LOAD May 10 03:35:11.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2507 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233383131663465356438643736626435363533333936303235353930 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=2507 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233383131663465356438643736626435363533333936303235353930 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.294000 audit: BPF prog-id=123 op=LOAD May 10 03:35:11.294000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c000309040 items=0 ppid=2507 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.294000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233383131663465356438643736626435363533333936303235353930 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit: BPF prog-id=124 op=LOAD May 10 03:35:11.295000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c000309088 items=0 ppid=2507 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233383131663465356438643736626435363533333936303235353930 May 10 03:35:11.295000 audit: BPF prog-id=124 op=UNLOAD May 10 03:35:11.295000 audit: BPF prog-id=123 op=UNLOAD May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { perfmon } for pid=2519 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit[2519]: AVC avc: denied { bpf } for pid=2519 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:11.295000 audit: BPF prog-id=125 op=LOAD May 10 03:35:11.295000 audit[2519]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c000309498 items=0 ppid=2507 pid=2519 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.295000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233383131663465356438643736626435363533333936303235353930 May 10 03:35:11.314124 env[1150]: time="2025-05-10T03:35:11.314072793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-gbsvm,Uid:f15ca8bc-705d-4fa6-9a1f-d043535e58cf,Namespace:calico-system,Attempt:0,} returns sandbox id \"23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335\"" May 10 03:35:11.665000 audit[2544]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:11.665000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffe882a7490 a2=0 a3=7ffe882a747c items=0 ppid=2165 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:11.670000 audit[2544]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2544 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:11.670000 audit[2544]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe882a7490 a2=0 a3=0 items=0 ppid=2165 pid=2544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:11.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:13.005588 kubelet[2031]: E0510 03:35:13.005535 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:14.806397 env[1150]: time="2025-05-10T03:35:14.806340143Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:14.808665 env[1150]: time="2025-05-10T03:35:14.808625039Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:14.810527 env[1150]: time="2025-05-10T03:35:14.810489656Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:14.812082 env[1150]: time="2025-05-10T03:35:14.812044320Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:14.812512 env[1150]: time="2025-05-10T03:35:14.812470480Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 10 03:35:14.817144 env[1150]: time="2025-05-10T03:35:14.817021165Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 10 03:35:14.835483 env[1150]: time="2025-05-10T03:35:14.835440007Z" level=info msg="CreateContainer within sandbox \"a0b1e0bfdb699d5adc92045740c04ff6511b4ca669b71fb21e251feee4be4682\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 10 03:35:14.855760 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount342800811.mount: Deactivated successfully. May 10 03:35:14.865140 env[1150]: time="2025-05-10T03:35:14.865107615Z" level=info msg="CreateContainer within sandbox \"a0b1e0bfdb699d5adc92045740c04ff6511b4ca669b71fb21e251feee4be4682\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"748716f450b9b9d12990fd441124534099c042bfda88bcb2fcc414a9219617f6\"" May 10 03:35:14.865814 env[1150]: time="2025-05-10T03:35:14.865792439Z" level=info msg="StartContainer for \"748716f450b9b9d12990fd441124534099c042bfda88bcb2fcc414a9219617f6\"" May 10 03:35:14.894372 systemd[1]: Started cri-containerd-748716f450b9b9d12990fd441124534099c042bfda88bcb2fcc414a9219617f6.scope. May 10 03:35:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.918000 audit: BPF prog-id=126 op=LOAD May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2409 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383731366634353062396239643132393930666434343131323435 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2409 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383731366634353062396239643132393930666434343131323435 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit: BPF prog-id=127 op=LOAD May 10 03:35:14.919000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cfd70 items=0 ppid=2409 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383731366634353062396239643132393930666434343131323435 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit: BPF prog-id=128 op=LOAD May 10 03:35:14.919000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cfdb8 items=0 ppid=2409 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383731366634353062396239643132393930666434343131323435 May 10 03:35:14.919000 audit: BPF prog-id=128 op=UNLOAD May 10 03:35:14.919000 audit: BPF prog-id=127 op=UNLOAD May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:14.919000 audit: BPF prog-id=129 op=LOAD May 10 03:35:14.919000 audit[2555]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00033e1c8 items=0 ppid=2409 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:14.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734383731366634353062396239643132393930666434343131323435 May 10 03:35:14.955352 env[1150]: time="2025-05-10T03:35:14.955310800Z" level=info msg="StartContainer for \"748716f450b9b9d12990fd441124534099c042bfda88bcb2fcc414a9219617f6\" returns successfully" May 10 03:35:15.003818 kubelet[2031]: E0510 03:35:15.003769 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:15.166127 kubelet[2031]: E0510 03:35:15.166019 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.166303 kubelet[2031]: W0510 03:35:15.166288 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.166402 kubelet[2031]: E0510 03:35:15.166389 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.166677 kubelet[2031]: E0510 03:35:15.166667 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.166765 kubelet[2031]: W0510 03:35:15.166753 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.166852 kubelet[2031]: E0510 03:35:15.166841 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.167688 kubelet[2031]: E0510 03:35:15.167677 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.167822 kubelet[2031]: W0510 03:35:15.167809 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.167957 kubelet[2031]: E0510 03:35:15.167944 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.168221 kubelet[2031]: E0510 03:35:15.168211 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.168314 kubelet[2031]: W0510 03:35:15.168302 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.168389 kubelet[2031]: E0510 03:35:15.168377 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.168621 kubelet[2031]: E0510 03:35:15.168600 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.168697 kubelet[2031]: W0510 03:35:15.168685 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.168772 kubelet[2031]: E0510 03:35:15.168759 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.168987 kubelet[2031]: E0510 03:35:15.168966 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.169066 kubelet[2031]: W0510 03:35:15.169054 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.169139 kubelet[2031]: E0510 03:35:15.169128 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.169368 kubelet[2031]: E0510 03:35:15.169348 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.169443 kubelet[2031]: W0510 03:35:15.169432 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.169524 kubelet[2031]: E0510 03:35:15.169512 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.169744 kubelet[2031]: E0510 03:35:15.169722 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.169825 kubelet[2031]: W0510 03:35:15.169813 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.169903 kubelet[2031]: E0510 03:35:15.169892 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.170116 kubelet[2031]: E0510 03:35:15.170106 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.170198 kubelet[2031]: W0510 03:35:15.170187 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.170258 kubelet[2031]: E0510 03:35:15.170248 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.170459 kubelet[2031]: E0510 03:35:15.170449 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.170527 kubelet[2031]: W0510 03:35:15.170516 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.170617 kubelet[2031]: E0510 03:35:15.170606 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.170790 kubelet[2031]: E0510 03:35:15.170780 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.170860 kubelet[2031]: W0510 03:35:15.170849 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.170929 kubelet[2031]: E0510 03:35:15.170918 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.171120 kubelet[2031]: E0510 03:35:15.171110 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.171189 kubelet[2031]: W0510 03:35:15.171178 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.171256 kubelet[2031]: E0510 03:35:15.171245 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.171460 kubelet[2031]: E0510 03:35:15.171450 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.171530 kubelet[2031]: W0510 03:35:15.171519 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.171601 kubelet[2031]: E0510 03:35:15.171590 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.174591 kubelet[2031]: E0510 03:35:15.174573 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.174694 kubelet[2031]: W0510 03:35:15.174681 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.174772 kubelet[2031]: E0510 03:35:15.174760 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.174961 kubelet[2031]: E0510 03:35:15.174951 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.175026 kubelet[2031]: W0510 03:35:15.175015 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.175094 kubelet[2031]: E0510 03:35:15.175083 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.179344 kubelet[2031]: E0510 03:35:15.179326 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.179463 kubelet[2031]: W0510 03:35:15.179451 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.179566 kubelet[2031]: E0510 03:35:15.179534 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.179828 kubelet[2031]: E0510 03:35:15.179818 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.179899 kubelet[2031]: W0510 03:35:15.179888 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.179967 kubelet[2031]: E0510 03:35:15.179956 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.180192 kubelet[2031]: E0510 03:35:15.180180 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.180259 kubelet[2031]: W0510 03:35:15.180247 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.180348 kubelet[2031]: E0510 03:35:15.180337 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.180539 kubelet[2031]: E0510 03:35:15.180530 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.180604 kubelet[2031]: W0510 03:35:15.180594 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.180666 kubelet[2031]: E0510 03:35:15.180656 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.180873 kubelet[2031]: E0510 03:35:15.180863 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.180938 kubelet[2031]: W0510 03:35:15.180927 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.181004 kubelet[2031]: E0510 03:35:15.180994 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.181190 kubelet[2031]: E0510 03:35:15.181180 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.181261 kubelet[2031]: W0510 03:35:15.181250 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.181351 kubelet[2031]: E0510 03:35:15.181340 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.183346 kubelet[2031]: E0510 03:35:15.183335 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.183419 kubelet[2031]: W0510 03:35:15.183408 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.183491 kubelet[2031]: E0510 03:35:15.183480 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.183706 kubelet[2031]: E0510 03:35:15.183697 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.183774 kubelet[2031]: W0510 03:35:15.183763 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.183836 kubelet[2031]: E0510 03:35:15.183826 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.184014 kubelet[2031]: E0510 03:35:15.184004 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.184079 kubelet[2031]: W0510 03:35:15.184068 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.184149 kubelet[2031]: E0510 03:35:15.184139 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.184387 kubelet[2031]: E0510 03:35:15.184377 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.184461 kubelet[2031]: W0510 03:35:15.184450 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.184523 kubelet[2031]: E0510 03:35:15.184513 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.184697 kubelet[2031]: E0510 03:35:15.184688 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.184767 kubelet[2031]: W0510 03:35:15.184756 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.184836 kubelet[2031]: E0510 03:35:15.184825 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.185034 kubelet[2031]: E0510 03:35:15.185024 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.185099 kubelet[2031]: W0510 03:35:15.185089 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.185165 kubelet[2031]: E0510 03:35:15.185155 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.187201 kubelet[2031]: E0510 03:35:15.187188 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.187308 kubelet[2031]: W0510 03:35:15.187296 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.187441 kubelet[2031]: E0510 03:35:15.187429 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.187602 kubelet[2031]: E0510 03:35:15.187592 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.187675 kubelet[2031]: W0510 03:35:15.187664 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.187786 kubelet[2031]: E0510 03:35:15.187775 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.187931 kubelet[2031]: E0510 03:35:15.187922 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.187995 kubelet[2031]: W0510 03:35:15.187984 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.188103 kubelet[2031]: E0510 03:35:15.188093 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.188598 kubelet[2031]: E0510 03:35:15.188588 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.188668 kubelet[2031]: W0510 03:35:15.188657 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.188729 kubelet[2031]: E0510 03:35:15.188719 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.189048 kubelet[2031]: E0510 03:35:15.189038 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.189115 kubelet[2031]: W0510 03:35:15.189104 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.189186 kubelet[2031]: E0510 03:35:15.189176 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:15.189438 kubelet[2031]: E0510 03:35:15.189429 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:15.189505 kubelet[2031]: W0510 03:35:15.189494 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:15.189563 kubelet[2031]: E0510 03:35:15.189553 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.117802 kubelet[2031]: I0510 03:35:16.117715 2031 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 03:35:16.183900 kubelet[2031]: E0510 03:35:16.183633 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.183900 kubelet[2031]: W0510 03:35:16.183673 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.183900 kubelet[2031]: E0510 03:35:16.183711 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.185434 kubelet[2031]: E0510 03:35:16.184429 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.185434 kubelet[2031]: W0510 03:35:16.184457 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.185434 kubelet[2031]: E0510 03:35:16.184482 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.185434 kubelet[2031]: E0510 03:35:16.184863 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.185434 kubelet[2031]: W0510 03:35:16.184885 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.185434 kubelet[2031]: E0510 03:35:16.184906 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.185434 kubelet[2031]: E0510 03:35:16.185197 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.185434 kubelet[2031]: W0510 03:35:16.185219 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.185434 kubelet[2031]: E0510 03:35:16.185241 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.186665 kubelet[2031]: E0510 03:35:16.186483 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.186665 kubelet[2031]: W0510 03:35:16.186510 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.186665 kubelet[2031]: E0510 03:35:16.186534 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.187126 kubelet[2031]: E0510 03:35:16.187100 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.187496 kubelet[2031]: W0510 03:35:16.187254 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.187496 kubelet[2031]: E0510 03:35:16.187353 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.187990 kubelet[2031]: E0510 03:35:16.187964 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.188158 kubelet[2031]: W0510 03:35:16.188130 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.188580 kubelet[2031]: E0510 03:35:16.188413 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.188828 kubelet[2031]: E0510 03:35:16.188802 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.188986 kubelet[2031]: W0510 03:35:16.188959 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.189150 kubelet[2031]: E0510 03:35:16.189119 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.189741 kubelet[2031]: E0510 03:35:16.189715 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.189955 kubelet[2031]: W0510 03:35:16.189926 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.190124 kubelet[2031]: E0510 03:35:16.190096 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.191617 kubelet[2031]: E0510 03:35:16.191588 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.191785 kubelet[2031]: W0510 03:35:16.191758 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.191930 kubelet[2031]: E0510 03:35:16.191904 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.192505 kubelet[2031]: E0510 03:35:16.192478 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.192665 kubelet[2031]: W0510 03:35:16.192639 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.192836 kubelet[2031]: E0510 03:35:16.192809 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.193390 kubelet[2031]: E0510 03:35:16.193361 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.193551 kubelet[2031]: W0510 03:35:16.193525 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.193693 kubelet[2031]: E0510 03:35:16.193668 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.194184 kubelet[2031]: E0510 03:35:16.194157 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.194410 kubelet[2031]: W0510 03:35:16.194382 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.194589 kubelet[2031]: E0510 03:35:16.194561 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.195003 kubelet[2031]: E0510 03:35:16.194978 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.195160 kubelet[2031]: W0510 03:35:16.195134 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.195364 kubelet[2031]: E0510 03:35:16.195334 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.195825 kubelet[2031]: E0510 03:35:16.195799 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.195982 kubelet[2031]: W0510 03:35:16.195956 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.196154 kubelet[2031]: E0510 03:35:16.196127 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.196851 kubelet[2031]: E0510 03:35:16.196825 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.197064 kubelet[2031]: W0510 03:35:16.197035 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.197210 kubelet[2031]: E0510 03:35:16.197185 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.197757 kubelet[2031]: E0510 03:35:16.197731 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.197917 kubelet[2031]: W0510 03:35:16.197890 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.198087 kubelet[2031]: E0510 03:35:16.198060 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.198835 kubelet[2031]: E0510 03:35:16.198789 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.198950 kubelet[2031]: W0510 03:35:16.198834 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.198950 kubelet[2031]: E0510 03:35:16.198881 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.199415 kubelet[2031]: E0510 03:35:16.199374 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.199415 kubelet[2031]: W0510 03:35:16.199406 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.199641 kubelet[2031]: E0510 03:35:16.199441 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.199856 kubelet[2031]: E0510 03:35:16.199816 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.199856 kubelet[2031]: W0510 03:35:16.199848 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.200011 kubelet[2031]: E0510 03:35:16.199871 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.200542 kubelet[2031]: E0510 03:35:16.200499 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.200542 kubelet[2031]: W0510 03:35:16.200529 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.200778 kubelet[2031]: E0510 03:35:16.200709 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.201581 kubelet[2031]: E0510 03:35:16.201531 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.201732 kubelet[2031]: W0510 03:35:16.201590 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.201878 kubelet[2031]: E0510 03:35:16.201843 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.202066 kubelet[2031]: E0510 03:35:16.201940 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.202066 kubelet[2031]: W0510 03:35:16.202064 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.202427 kubelet[2031]: E0510 03:35:16.202394 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.202628 kubelet[2031]: E0510 03:35:16.202437 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.202780 kubelet[2031]: W0510 03:35:16.202750 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.202942 kubelet[2031]: E0510 03:35:16.202915 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.203334 kubelet[2031]: E0510 03:35:16.203251 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.203464 kubelet[2031]: W0510 03:35:16.203350 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.203464 kubelet[2031]: E0510 03:35:16.203389 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.203849 kubelet[2031]: E0510 03:35:16.203802 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.203849 kubelet[2031]: W0510 03:35:16.203835 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.204097 kubelet[2031]: E0510 03:35:16.204063 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.204367 kubelet[2031]: E0510 03:35:16.204127 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.204538 kubelet[2031]: W0510 03:35:16.204509 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.204707 kubelet[2031]: E0510 03:35:16.204677 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.205040 kubelet[2031]: E0510 03:35:16.204998 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.205040 kubelet[2031]: W0510 03:35:16.205028 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.205252 kubelet[2031]: E0510 03:35:16.205061 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.207078 kubelet[2031]: E0510 03:35:16.205543 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.207078 kubelet[2031]: W0510 03:35:16.205572 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.207078 kubelet[2031]: E0510 03:35:16.205604 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.207078 kubelet[2031]: E0510 03:35:16.206229 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.207078 kubelet[2031]: W0510 03:35:16.206248 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.207078 kubelet[2031]: E0510 03:35:16.206481 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.207078 kubelet[2031]: E0510 03:35:16.206742 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.207078 kubelet[2031]: W0510 03:35:16.206762 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.207078 kubelet[2031]: E0510 03:35:16.206784 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.208017 kubelet[2031]: E0510 03:35:16.207206 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.208017 kubelet[2031]: W0510 03:35:16.207229 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.208017 kubelet[2031]: E0510 03:35:16.207252 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:16.209408 kubelet[2031]: E0510 03:35:16.209349 2031 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 10 03:35:16.209408 kubelet[2031]: W0510 03:35:16.209377 2031 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 10 03:35:16.209633 kubelet[2031]: E0510 03:35:16.209500 2031 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 10 03:35:17.001647 env[1150]: time="2025-05-10T03:35:17.001565529Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:17.003431 kubelet[2031]: E0510 03:35:17.003329 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:17.006010 env[1150]: time="2025-05-10T03:35:17.005956184Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:17.009099 env[1150]: time="2025-05-10T03:35:17.009049384Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:17.021532 env[1150]: time="2025-05-10T03:35:17.021462093Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:17.021954 env[1150]: time="2025-05-10T03:35:17.021907368Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 10 03:35:17.026740 env[1150]: time="2025-05-10T03:35:17.026688225Z" level=info msg="CreateContainer within sandbox \"23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 10 03:35:17.051507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4005599537.mount: Deactivated successfully. May 10 03:35:17.061190 env[1150]: time="2025-05-10T03:35:17.061114517Z" level=info msg="CreateContainer within sandbox \"23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"fee8eaf979d9c0ae8bf30beea3af67938082c320ba1e5105b498fefb8b30a6e8\"" May 10 03:35:17.062839 env[1150]: time="2025-05-10T03:35:17.062781153Z" level=info msg="StartContainer for \"fee8eaf979d9c0ae8bf30beea3af67938082c320ba1e5105b498fefb8b30a6e8\"" May 10 03:35:17.103084 systemd[1]: Started cri-containerd-fee8eaf979d9c0ae8bf30beea3af67938082c320ba1e5105b498fefb8b30a6e8.scope. May 10 03:35:17.116000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.119645 kernel: kauditd_printk_skb: 179 callbacks suppressed May 10 03:35:17.119688 kernel: audit: type=1400 audit(1746848117.116:992): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.124300 kernel: audit: type=1300 audit(1746848117.116:992): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fced73a5d48 items=0 ppid=2507 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:17.116000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fced73a5d48 items=0 ppid=2507 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:17.116000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653865616639373964396330616538626633306265656133616636 May 10 03:35:17.138491 kernel: audit: type=1327 audit(1746848117.116:992): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653865616639373964396330616538626633306265656133616636 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.154554 kernel: audit: type=1400 audit(1746848117.117:993): avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.154615 kernel: audit: type=1400 audit(1746848117.117:993): avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.154652 kernel: audit: type=1400 audit(1746848117.117:993): avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.154671 kernel: audit: type=1400 audit(1746848117.117:993): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.162323 kernel: audit: type=1400 audit(1746848117.117:993): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.167104 kernel: audit: type=1400 audit(1746848117.117:993): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.171850 kernel: audit: type=1400 audit(1746848117.117:993): avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.117000 audit: BPF prog-id=130 op=LOAD May 10 03:35:17.117000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001b53c8 items=0 ppid=2507 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:17.117000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653865616639373964396330616538626633306265656133616636 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.123000 audit: BPF prog-id=131 op=LOAD May 10 03:35:17.123000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001b5418 items=0 ppid=2507 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:17.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653865616639373964396330616538626633306265656133616636 May 10 03:35:17.130000 audit: BPF prog-id=131 op=UNLOAD May 10 03:35:17.130000 audit: BPF prog-id=130 op=UNLOAD May 10 03:35:17.130000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { perfmon } for pid=2657 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit[2657]: AVC avc: denied { bpf } for pid=2657 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:17.130000 audit: BPF prog-id=132 op=LOAD May 10 03:35:17.130000 audit[2657]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001b54a8 items=0 ppid=2507 pid=2657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:17.130000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665653865616639373964396330616538626633306265656133616636 May 10 03:35:17.185001 env[1150]: time="2025-05-10T03:35:17.184433580Z" level=info msg="StartContainer for \"fee8eaf979d9c0ae8bf30beea3af67938082c320ba1e5105b498fefb8b30a6e8\" returns successfully" May 10 03:35:17.188430 systemd[1]: cri-containerd-fee8eaf979d9c0ae8bf30beea3af67938082c320ba1e5105b498fefb8b30a6e8.scope: Deactivated successfully. May 10 03:35:17.192000 audit: BPF prog-id=132 op=UNLOAD May 10 03:35:17.210083 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-fee8eaf979d9c0ae8bf30beea3af67938082c320ba1e5105b498fefb8b30a6e8-rootfs.mount: Deactivated successfully. May 10 03:35:17.969835 env[1150]: time="2025-05-10T03:35:17.969706348Z" level=info msg="shim disconnected" id=fee8eaf979d9c0ae8bf30beea3af67938082c320ba1e5105b498fefb8b30a6e8 May 10 03:35:17.969835 env[1150]: time="2025-05-10T03:35:17.969802900Z" level=warning msg="cleaning up after shim disconnected" id=fee8eaf979d9c0ae8bf30beea3af67938082c320ba1e5105b498fefb8b30a6e8 namespace=k8s.io May 10 03:35:17.969835 env[1150]: time="2025-05-10T03:35:17.969828828Z" level=info msg="cleaning up dead shim" May 10 03:35:17.984941 env[1150]: time="2025-05-10T03:35:17.984835823Z" level=warning msg="cleanup warnings time=\"2025-05-10T03:35:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2698 runtime=io.containerd.runc.v2\n" May 10 03:35:18.154265 env[1150]: time="2025-05-10T03:35:18.154196733Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 10 03:35:18.194353 kubelet[2031]: I0510 03:35:18.193394 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-679bc5b5d8-w55p8" podStartSLOduration=4.584482725 podStartE2EDuration="8.193362925s" podCreationTimestamp="2025-05-10 03:35:10 +0000 UTC" firstStartedPulling="2025-05-10 03:35:11.205312901 +0000 UTC m=+22.332608192" lastFinishedPulling="2025-05-10 03:35:14.81419308 +0000 UTC m=+25.941488392" observedRunningTime="2025-05-10 03:35:15.145405479 +0000 UTC m=+26.272700770" watchObservedRunningTime="2025-05-10 03:35:18.193362925 +0000 UTC m=+29.320658297" May 10 03:35:19.004590 kubelet[2031]: E0510 03:35:19.004512 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:21.003399 kubelet[2031]: E0510 03:35:21.003347 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:23.004016 kubelet[2031]: E0510 03:35:23.003947 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:25.003799 kubelet[2031]: E0510 03:35:25.003388 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:25.046635 kubelet[2031]: I0510 03:35:25.046571 2031 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 03:35:25.117000 audit[2716]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:25.120002 kernel: kauditd_printk_skb: 34 callbacks suppressed May 10 03:35:25.120083 kernel: audit: type=1325 audit(1746848125.117:999): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:25.117000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd8030ff00 a2=0 a3=7ffd8030feec items=0 ppid=2165 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.131009 kernel: audit: type=1300 audit(1746848125.117:999): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd8030ff00 a2=0 a3=7ffd8030feec items=0 ppid=2165 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:25.135000 audit[2716]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:25.140537 kernel: audit: type=1327 audit(1746848125.117:999): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:25.140600 kernel: audit: type=1325 audit(1746848125.135:1000): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:25.135000 audit[2716]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd8030ff00 a2=0 a3=7ffd8030feec items=0 ppid=2165 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:25.153443 kernel: audit: type=1300 audit(1746848125.135:1000): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd8030ff00 a2=0 a3=7ffd8030feec items=0 ppid=2165 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.153489 kernel: audit: type=1327 audit(1746848125.135:1000): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:25.283578 env[1150]: time="2025-05-10T03:35:25.283430285Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:25.286262 env[1150]: time="2025-05-10T03:35:25.286205352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:25.289041 env[1150]: time="2025-05-10T03:35:25.289009734Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:25.292046 env[1150]: time="2025-05-10T03:35:25.292025375Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:25.293694 env[1150]: time="2025-05-10T03:35:25.293594852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 10 03:35:25.299565 env[1150]: time="2025-05-10T03:35:25.299537237Z" level=info msg="CreateContainer within sandbox \"23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 10 03:35:25.321150 env[1150]: time="2025-05-10T03:35:25.321087227Z" level=info msg="CreateContainer within sandbox \"23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808\"" May 10 03:35:25.323307 env[1150]: time="2025-05-10T03:35:25.323266237Z" level=info msg="StartContainer for \"be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808\"" May 10 03:35:25.348706 systemd[1]: Started cri-containerd-be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808.scope. May 10 03:35:25.361891 systemd[1]: run-containerd-runc-k8s.io-be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808-runc.4PI92H.mount: Deactivated successfully. May 10 03:35:25.380000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4307d102f8 items=0 ppid=2507 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.393188 kernel: audit: type=1400 audit(1746848125.380:1001): avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.393239 kernel: audit: type=1300 audit(1746848125.380:1001): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4307d102f8 items=0 ppid=2507 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632343639333361373539643265343336633138393934346663 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.404091 kernel: audit: type=1327 audit(1746848125.380:1001): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632343639333361373539643265343336633138393934346663 May 10 03:35:25.404194 kernel: audit: type=1400 audit(1746848125.380:1002): avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.380000 audit: BPF prog-id=133 op=LOAD May 10 03:35:25.380000 audit[2724]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024918 items=0 ppid=2507 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632343639333361373539643265343336633138393934346663 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.384000 audit: BPF prog-id=134 op=LOAD May 10 03:35:25.384000 audit[2724]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024968 items=0 ppid=2507 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.384000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632343639333361373539643265343336633138393934346663 May 10 03:35:25.392000 audit: BPF prog-id=134 op=UNLOAD May 10 03:35:25.392000 audit: BPF prog-id=133 op=UNLOAD May 10 03:35:25.392000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { perfmon } for pid=2724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit[2724]: AVC avc: denied { bpf } for pid=2724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:25.392000 audit: BPF prog-id=135 op=LOAD May 10 03:35:25.392000 audit[2724]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0000249f8 items=0 ppid=2507 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:25.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265386632343639333361373539643265343336633138393934346663 May 10 03:35:25.421840 env[1150]: time="2025-05-10T03:35:25.421799816Z" level=info msg="StartContainer for \"be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808\" returns successfully" May 10 03:35:26.716995 env[1150]: time="2025-05-10T03:35:26.716890603Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 10 03:35:26.720621 systemd[1]: cri-containerd-be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808.scope: Deactivated successfully. May 10 03:35:26.724000 audit: BPF prog-id=135 op=UNLOAD May 10 03:35:26.756425 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808-rootfs.mount: Deactivated successfully. May 10 03:35:26.819676 kubelet[2031]: I0510 03:35:26.819598 2031 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 10 03:35:27.250175 kubelet[2031]: I0510 03:35:27.241229 2031 topology_manager.go:215] "Topology Admit Handler" podUID="07b0d8c4-503a-4abd-8662-ad72b8771bda" podNamespace="kube-system" podName="coredns-7db6d8ff4d-fhwvv" May 10 03:35:27.015185 systemd[1]: Created slice kubepods-besteffort-podf901b9fc_1fd8_4d58_b6a2_96852a615b4b.slice. May 10 03:35:27.263069 env[1150]: time="2025-05-10T03:35:27.262381638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xkbzj,Uid:f901b9fc-1fd8-4d58-b6a2-96852a615b4b,Namespace:calico-system,Attempt:0,}" May 10 03:35:27.269787 systemd[1]: Created slice kubepods-burstable-pod07b0d8c4_503a_4abd_8662_ad72b8771bda.slice. May 10 03:35:27.281010 kubelet[2031]: I0510 03:35:27.280959 2031 topology_manager.go:215] "Topology Admit Handler" podUID="bbb57afd-a29e-4b88-a48a-441691cf9617" podNamespace="kube-system" podName="coredns-7db6d8ff4d-v6mlw" May 10 03:35:27.285682 kubelet[2031]: I0510 03:35:27.285629 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bbb57afd-a29e-4b88-a48a-441691cf9617-config-volume\") pod \"coredns-7db6d8ff4d-v6mlw\" (UID: \"bbb57afd-a29e-4b88-a48a-441691cf9617\") " pod="kube-system/coredns-7db6d8ff4d-v6mlw" May 10 03:35:27.286008 kubelet[2031]: I0510 03:35:27.285972 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-84n4v\" (UniqueName: \"kubernetes.io/projected/07b0d8c4-503a-4abd-8662-ad72b8771bda-kube-api-access-84n4v\") pod \"coredns-7db6d8ff4d-fhwvv\" (UID: \"07b0d8c4-503a-4abd-8662-ad72b8771bda\") " pod="kube-system/coredns-7db6d8ff4d-fhwvv" May 10 03:35:27.286226 kubelet[2031]: I0510 03:35:27.286191 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-w574q\" (UniqueName: \"kubernetes.io/projected/bbb57afd-a29e-4b88-a48a-441691cf9617-kube-api-access-w574q\") pod \"coredns-7db6d8ff4d-v6mlw\" (UID: \"bbb57afd-a29e-4b88-a48a-441691cf9617\") " pod="kube-system/coredns-7db6d8ff4d-v6mlw" May 10 03:35:27.286535 kubelet[2031]: I0510 03:35:27.286497 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/07b0d8c4-503a-4abd-8662-ad72b8771bda-config-volume\") pod \"coredns-7db6d8ff4d-fhwvv\" (UID: \"07b0d8c4-503a-4abd-8662-ad72b8771bda\") " pod="kube-system/coredns-7db6d8ff4d-fhwvv" May 10 03:35:27.287068 kubelet[2031]: I0510 03:35:27.286997 2031 topology_manager.go:215] "Topology Admit Handler" podUID="38cb6e2c-c2a0-409b-9230-a9cc8785c2cf" podNamespace="calico-apiserver" podName="calico-apiserver-7899b5db6d-v9nrp" May 10 03:35:27.292083 kubelet[2031]: I0510 03:35:27.292014 2031 topology_manager.go:215] "Topology Admit Handler" podUID="e1fb9b91-17d3-445c-8a9b-1b2aeb70a534" podNamespace="calico-apiserver" podName="calico-apiserver-7899b5db6d-kf5bg" May 10 03:35:27.318260 kubelet[2031]: I0510 03:35:27.318233 2031 topology_manager.go:215] "Topology Admit Handler" podUID="cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7" podNamespace="calico-system" podName="calico-kube-controllers-765b4476b7-smp42" May 10 03:35:27.321519 systemd[1]: Created slice kubepods-burstable-podbbb57afd_a29e_4b88_a48a_441691cf9617.slice. May 10 03:35:27.325845 systemd[1]: Created slice kubepods-besteffort-pode1fb9b91_17d3_445c_8a9b_1b2aeb70a534.slice. May 10 03:35:27.330125 systemd[1]: Created slice kubepods-besteffort-pod38cb6e2c_c2a0_409b_9230_a9cc8785c2cf.slice. May 10 03:35:27.334633 systemd[1]: Created slice kubepods-besteffort-podcc6a7cf7_cac6_46cf_9ad6_23c579cfc8f7.slice. May 10 03:35:27.387091 kubelet[2031]: I0510 03:35:27.387018 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e1fb9b91-17d3-445c-8a9b-1b2aeb70a534-calico-apiserver-certs\") pod \"calico-apiserver-7899b5db6d-kf5bg\" (UID: \"e1fb9b91-17d3-445c-8a9b-1b2aeb70a534\") " pod="calico-apiserver/calico-apiserver-7899b5db6d-kf5bg" May 10 03:35:27.387091 kubelet[2031]: I0510 03:35:27.387062 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-87n27\" (UniqueName: \"kubernetes.io/projected/38cb6e2c-c2a0-409b-9230-a9cc8785c2cf-kube-api-access-87n27\") pod \"calico-apiserver-7899b5db6d-v9nrp\" (UID: \"38cb6e2c-c2a0-409b-9230-a9cc8785c2cf\") " pod="calico-apiserver/calico-apiserver-7899b5db6d-v9nrp" May 10 03:35:27.387091 kubelet[2031]: I0510 03:35:27.387095 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7-tigera-ca-bundle\") pod \"calico-kube-controllers-765b4476b7-smp42\" (UID: \"cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7\") " pod="calico-system/calico-kube-controllers-765b4476b7-smp42" May 10 03:35:27.387469 kubelet[2031]: I0510 03:35:27.387127 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dvnjw\" (UniqueName: \"kubernetes.io/projected/e1fb9b91-17d3-445c-8a9b-1b2aeb70a534-kube-api-access-dvnjw\") pod \"calico-apiserver-7899b5db6d-kf5bg\" (UID: \"e1fb9b91-17d3-445c-8a9b-1b2aeb70a534\") " pod="calico-apiserver/calico-apiserver-7899b5db6d-kf5bg" May 10 03:35:27.387469 kubelet[2031]: I0510 03:35:27.387146 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j2ljq\" (UniqueName: \"kubernetes.io/projected/cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7-kube-api-access-j2ljq\") pod \"calico-kube-controllers-765b4476b7-smp42\" (UID: \"cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7\") " pod="calico-system/calico-kube-controllers-765b4476b7-smp42" May 10 03:35:27.387469 kubelet[2031]: I0510 03:35:27.387177 2031 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/38cb6e2c-c2a0-409b-9230-a9cc8785c2cf-calico-apiserver-certs\") pod \"calico-apiserver-7899b5db6d-v9nrp\" (UID: \"38cb6e2c-c2a0-409b-9230-a9cc8785c2cf\") " pod="calico-apiserver/calico-apiserver-7899b5db6d-v9nrp" May 10 03:35:27.624945 env[1150]: time="2025-05-10T03:35:27.624896877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v6mlw,Uid:bbb57afd-a29e-4b88-a48a-441691cf9617,Namespace:kube-system,Attempt:0,}" May 10 03:35:27.628674 env[1150]: time="2025-05-10T03:35:27.628636724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7899b5db6d-kf5bg,Uid:e1fb9b91-17d3-445c-8a9b-1b2aeb70a534,Namespace:calico-apiserver,Attempt:0,}" May 10 03:35:27.633389 env[1150]: time="2025-05-10T03:35:27.633352176Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7899b5db6d-v9nrp,Uid:38cb6e2c-c2a0-409b-9230-a9cc8785c2cf,Namespace:calico-apiserver,Attempt:0,}" May 10 03:35:27.637081 env[1150]: time="2025-05-10T03:35:27.637055123Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-765b4476b7-smp42,Uid:cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7,Namespace:calico-system,Attempt:0,}" May 10 03:35:27.740870 env[1150]: time="2025-05-10T03:35:27.740788139Z" level=info msg="shim disconnected" id=be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808 May 10 03:35:27.741204 env[1150]: time="2025-05-10T03:35:27.740875604Z" level=warning msg="cleaning up after shim disconnected" id=be8f246933a759d2e436c189944fc2a477eff247db833480bb3f533deea54808 namespace=k8s.io May 10 03:35:27.741204 env[1150]: time="2025-05-10T03:35:27.740899860Z" level=info msg="cleaning up dead shim" May 10 03:35:27.778829 env[1150]: time="2025-05-10T03:35:27.778728505Z" level=warning msg="cleanup warnings time=\"2025-05-10T03:35:27Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2775 runtime=io.containerd.runc.v2\n" May 10 03:35:27.887025 env[1150]: time="2025-05-10T03:35:27.886929745Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fhwvv,Uid:07b0d8c4-503a-4abd-8662-ad72b8771bda,Namespace:kube-system,Attempt:0,}" May 10 03:35:27.966358 env[1150]: time="2025-05-10T03:35:27.966293930Z" level=error msg="Failed to destroy network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:27.966929 env[1150]: time="2025-05-10T03:35:27.966880959Z" level=error msg="encountered an error cleaning up failed sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:27.967622 env[1150]: time="2025-05-10T03:35:27.967575351Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xkbzj,Uid:f901b9fc-1fd8-4d58-b6a2-96852a615b4b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:27.968304 kubelet[2031]: E0510 03:35:27.967929 2031 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:27.968304 kubelet[2031]: E0510 03:35:27.968014 2031 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xkbzj" May 10 03:35:27.968304 kubelet[2031]: E0510 03:35:27.968039 2031 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xkbzj" May 10 03:35:27.968624 kubelet[2031]: E0510 03:35:27.968087 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xkbzj_calico-system(f901b9fc-1fd8-4d58-b6a2-96852a615b4b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xkbzj_calico-system(f901b9fc-1fd8-4d58-b6a2-96852a615b4b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:28.000687 env[1150]: time="2025-05-10T03:35:28.000630737Z" level=error msg="Failed to destroy network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.001157 env[1150]: time="2025-05-10T03:35:28.001127946Z" level=error msg="encountered an error cleaning up failed sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.001301 env[1150]: time="2025-05-10T03:35:28.001250959Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7899b5db6d-v9nrp,Uid:38cb6e2c-c2a0-409b-9230-a9cc8785c2cf,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.001652 kubelet[2031]: E0510 03:35:28.001599 2031 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.001736 kubelet[2031]: E0510 03:35:28.001671 2031 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7899b5db6d-v9nrp" May 10 03:35:28.001736 kubelet[2031]: E0510 03:35:28.001700 2031 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7899b5db6d-v9nrp" May 10 03:35:28.001803 kubelet[2031]: E0510 03:35:28.001744 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7899b5db6d-v9nrp_calico-apiserver(38cb6e2c-c2a0-409b-9230-a9cc8785c2cf)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7899b5db6d-v9nrp_calico-apiserver(38cb6e2c-c2a0-409b-9230-a9cc8785c2cf)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7899b5db6d-v9nrp" podUID="38cb6e2c-c2a0-409b-9230-a9cc8785c2cf" May 10 03:35:28.019749 env[1150]: time="2025-05-10T03:35:28.019668165Z" level=error msg="Failed to destroy network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.020226 env[1150]: time="2025-05-10T03:35:28.020194509Z" level=error msg="encountered an error cleaning up failed sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.020367 env[1150]: time="2025-05-10T03:35:28.020336798Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v6mlw,Uid:bbb57afd-a29e-4b88-a48a-441691cf9617,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.020806 kubelet[2031]: E0510 03:35:28.020593 2031 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.020806 kubelet[2031]: E0510 03:35:28.020645 2031 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-v6mlw" May 10 03:35:28.020806 kubelet[2031]: E0510 03:35:28.020666 2031 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-v6mlw" May 10 03:35:28.020938 kubelet[2031]: E0510 03:35:28.020719 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-v6mlw_kube-system(bbb57afd-a29e-4b88-a48a-441691cf9617)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-v6mlw_kube-system(bbb57afd-a29e-4b88-a48a-441691cf9617)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v6mlw" podUID="bbb57afd-a29e-4b88-a48a-441691cf9617" May 10 03:35:28.044464 env[1150]: time="2025-05-10T03:35:28.044391145Z" level=error msg="Failed to destroy network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.044766 env[1150]: time="2025-05-10T03:35:28.044727240Z" level=error msg="encountered an error cleaning up failed sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.044838 env[1150]: time="2025-05-10T03:35:28.044789047Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fhwvv,Uid:07b0d8c4-503a-4abd-8662-ad72b8771bda,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.045306 kubelet[2031]: E0510 03:35:28.045008 2031 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.045306 kubelet[2031]: E0510 03:35:28.045069 2031 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-fhwvv" May 10 03:35:28.045306 kubelet[2031]: E0510 03:35:28.045091 2031 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-fhwvv" May 10 03:35:28.045428 kubelet[2031]: E0510 03:35:28.045134 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-fhwvv_kube-system(07b0d8c4-503a-4abd-8662-ad72b8771bda)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-fhwvv_kube-system(07b0d8c4-503a-4abd-8662-ad72b8771bda)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-fhwvv" podUID="07b0d8c4-503a-4abd-8662-ad72b8771bda" May 10 03:35:28.046845 env[1150]: time="2025-05-10T03:35:28.046802110Z" level=error msg="Failed to destroy network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.047217 env[1150]: time="2025-05-10T03:35:28.047185554Z" level=error msg="encountered an error cleaning up failed sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.047443 env[1150]: time="2025-05-10T03:35:28.047413074Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7899b5db6d-kf5bg,Uid:e1fb9b91-17d3-445c-8a9b-1b2aeb70a534,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.047894 kubelet[2031]: E0510 03:35:28.047718 2031 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.047894 kubelet[2031]: E0510 03:35:28.047761 2031 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7899b5db6d-kf5bg" May 10 03:35:28.047894 kubelet[2031]: E0510 03:35:28.047797 2031 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7899b5db6d-kf5bg" May 10 03:35:28.048030 kubelet[2031]: E0510 03:35:28.047835 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7899b5db6d-kf5bg_calico-apiserver(e1fb9b91-17d3-445c-8a9b-1b2aeb70a534)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7899b5db6d-kf5bg_calico-apiserver(e1fb9b91-17d3-445c-8a9b-1b2aeb70a534)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7899b5db6d-kf5bg" podUID="e1fb9b91-17d3-445c-8a9b-1b2aeb70a534" May 10 03:35:28.063798 env[1150]: time="2025-05-10T03:35:28.063738429Z" level=error msg="Failed to destroy network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.064294 env[1150]: time="2025-05-10T03:35:28.064223033Z" level=error msg="encountered an error cleaning up failed sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.064423 env[1150]: time="2025-05-10T03:35:28.064393286Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-765b4476b7-smp42,Uid:cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.066309 kubelet[2031]: E0510 03:35:28.064740 2031 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.066309 kubelet[2031]: E0510 03:35:28.064815 2031 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-765b4476b7-smp42" May 10 03:35:28.066309 kubelet[2031]: E0510 03:35:28.064855 2031 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-765b4476b7-smp42" May 10 03:35:28.066515 kubelet[2031]: E0510 03:35:28.064907 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-765b4476b7-smp42_calico-system(cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-765b4476b7-smp42_calico-system(cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-765b4476b7-smp42" podUID="cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7" May 10 03:35:28.200498 kubelet[2031]: I0510 03:35:28.194803 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:28.200713 env[1150]: time="2025-05-10T03:35:28.196052042Z" level=info msg="StopPodSandbox for \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\"" May 10 03:35:28.210113 kubelet[2031]: I0510 03:35:28.207825 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:28.210744 env[1150]: time="2025-05-10T03:35:28.210686923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 10 03:35:28.215553 kubelet[2031]: I0510 03:35:28.215120 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:28.218585 kubelet[2031]: I0510 03:35:28.218437 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:28.222117 env[1150]: time="2025-05-10T03:35:28.211113629Z" level=info msg="StopPodSandbox for \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\"" May 10 03:35:28.224118 env[1150]: time="2025-05-10T03:35:28.215863714Z" level=info msg="StopPodSandbox for \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\"" May 10 03:35:28.224754 env[1150]: time="2025-05-10T03:35:28.219114275Z" level=info msg="StopPodSandbox for \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\"" May 10 03:35:28.227532 kubelet[2031]: I0510 03:35:28.225881 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:28.227894 env[1150]: time="2025-05-10T03:35:28.227866440Z" level=info msg="StopPodSandbox for \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\"" May 10 03:35:28.229645 kubelet[2031]: I0510 03:35:28.229236 2031 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:35:28.229874 env[1150]: time="2025-05-10T03:35:28.229853003Z" level=info msg="StopPodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\"" May 10 03:35:28.299086 env[1150]: time="2025-05-10T03:35:28.299020684Z" level=error msg="StopPodSandbox for \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\" failed" error="failed to destroy network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.299752 kubelet[2031]: E0510 03:35:28.299508 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:28.299752 kubelet[2031]: E0510 03:35:28.299576 2031 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45"} May 10 03:35:28.299752 kubelet[2031]: E0510 03:35:28.299665 2031 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 03:35:28.299752 kubelet[2031]: E0510 03:35:28.299695 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-765b4476b7-smp42" podUID="cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7" May 10 03:35:28.350174 env[1150]: time="2025-05-10T03:35:28.350105320Z" level=error msg="StopPodSandbox for \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\" failed" error="failed to destroy network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.350403 kubelet[2031]: E0510 03:35:28.350362 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:28.350474 kubelet[2031]: E0510 03:35:28.350414 2031 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082"} May 10 03:35:28.350474 kubelet[2031]: E0510 03:35:28.350456 2031 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"07b0d8c4-503a-4abd-8662-ad72b8771bda\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 03:35:28.350582 kubelet[2031]: E0510 03:35:28.350482 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"07b0d8c4-503a-4abd-8662-ad72b8771bda\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-fhwvv" podUID="07b0d8c4-503a-4abd-8662-ad72b8771bda" May 10 03:35:28.354495 env[1150]: time="2025-05-10T03:35:28.354446993Z" level=error msg="StopPodSandbox for \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\" failed" error="failed to destroy network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.354943 kubelet[2031]: E0510 03:35:28.354763 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:28.354943 kubelet[2031]: E0510 03:35:28.354812 2031 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30"} May 10 03:35:28.354943 kubelet[2031]: E0510 03:35:28.354863 2031 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"38cb6e2c-c2a0-409b-9230-a9cc8785c2cf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 03:35:28.354943 kubelet[2031]: E0510 03:35:28.354914 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"38cb6e2c-c2a0-409b-9230-a9cc8785c2cf\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7899b5db6d-v9nrp" podUID="38cb6e2c-c2a0-409b-9230-a9cc8785c2cf" May 10 03:35:28.357022 env[1150]: time="2025-05-10T03:35:28.356981121Z" level=error msg="StopPodSandbox for \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\" failed" error="failed to destroy network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.357685 kubelet[2031]: E0510 03:35:28.357230 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:28.357685 kubelet[2031]: E0510 03:35:28.357308 2031 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438"} May 10 03:35:28.357914 kubelet[2031]: E0510 03:35:28.357819 2031 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e1fb9b91-17d3-445c-8a9b-1b2aeb70a534\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 03:35:28.357914 kubelet[2031]: E0510 03:35:28.357855 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e1fb9b91-17d3-445c-8a9b-1b2aeb70a534\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7899b5db6d-kf5bg" podUID="e1fb9b91-17d3-445c-8a9b-1b2aeb70a534" May 10 03:35:28.361181 env[1150]: time="2025-05-10T03:35:28.361122134Z" level=error msg="StopPodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\" failed" error="failed to destroy network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.361516 kubelet[2031]: E0510 03:35:28.361478 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:35:28.361585 kubelet[2031]: E0510 03:35:28.361529 2031 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed"} May 10 03:35:28.361585 kubelet[2031]: E0510 03:35:28.361564 2031 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bbb57afd-a29e-4b88-a48a-441691cf9617\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 03:35:28.361683 kubelet[2031]: E0510 03:35:28.361589 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bbb57afd-a29e-4b88-a48a-441691cf9617\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v6mlw" podUID="bbb57afd-a29e-4b88-a48a-441691cf9617" May 10 03:35:28.367823 env[1150]: time="2025-05-10T03:35:28.367785394Z" level=error msg="StopPodSandbox for \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\" failed" error="failed to destroy network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:28.368247 kubelet[2031]: E0510 03:35:28.368086 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:28.368247 kubelet[2031]: E0510 03:35:28.368130 2031 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706"} May 10 03:35:28.368247 kubelet[2031]: E0510 03:35:28.368181 2031 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f901b9fc-1fd8-4d58-b6a2-96852a615b4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 03:35:28.368247 kubelet[2031]: E0510 03:35:28.368204 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f901b9fc-1fd8-4d58-b6a2-96852a615b4b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xkbzj" podUID="f901b9fc-1fd8-4d58-b6a2-96852a615b4b" May 10 03:35:28.767028 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed-shm.mount: Deactivated successfully. May 10 03:35:28.767845 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706-shm.mount: Deactivated successfully. May 10 03:35:39.005582 env[1150]: time="2025-05-10T03:35:39.005514090Z" level=info msg="StopPodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\"" May 10 03:35:39.068165 env[1150]: time="2025-05-10T03:35:39.068110867Z" level=error msg="StopPodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\" failed" error="failed to destroy network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 10 03:35:39.068696 kubelet[2031]: E0510 03:35:39.068510 2031 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:35:39.068696 kubelet[2031]: E0510 03:35:39.068586 2031 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed"} May 10 03:35:39.068696 kubelet[2031]: E0510 03:35:39.068625 2031 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bbb57afd-a29e-4b88-a48a-441691cf9617\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 10 03:35:39.068696 kubelet[2031]: E0510 03:35:39.068667 2031 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bbb57afd-a29e-4b88-a48a-441691cf9617\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-v6mlw" podUID="bbb57afd-a29e-4b88-a48a-441691cf9617" May 10 03:35:39.421182 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2231123908.mount: Deactivated successfully. May 10 03:35:39.464324 env[1150]: time="2025-05-10T03:35:39.464251272Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:39.466870 env[1150]: time="2025-05-10T03:35:39.466828122Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:39.469346 env[1150]: time="2025-05-10T03:35:39.469312918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:39.471554 env[1150]: time="2025-05-10T03:35:39.471510171Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:39.472419 env[1150]: time="2025-05-10T03:35:39.472386965Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 10 03:35:39.489265 env[1150]: time="2025-05-10T03:35:39.489227594Z" level=info msg="CreateContainer within sandbox \"23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 10 03:35:39.509496 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount408943682.mount: Deactivated successfully. May 10 03:35:39.517687 env[1150]: time="2025-05-10T03:35:39.517647198Z" level=info msg="CreateContainer within sandbox \"23811f4e5d8d76bd565339602559080bb43f72268daf6e86edd285e0d7df3335\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879\"" May 10 03:35:39.518559 env[1150]: time="2025-05-10T03:35:39.518529262Z" level=info msg="StartContainer for \"8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879\"" May 10 03:35:39.536884 systemd[1]: Started cri-containerd-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879.scope. May 10 03:35:39.556000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559716 kernel: kauditd_printk_skb: 40 callbacks suppressed May 10 03:35:39.559783 kernel: audit: type=1400 audit(1746848139.556:1008): avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.556000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4dc88fb518 items=0 ppid=2507 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:39.556000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866666566613339323961666164383162616631313866393635363666 May 10 03:35:39.581519 kernel: audit: type=1300 audit(1746848139.556:1008): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f4dc88fb518 items=0 ppid=2507 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:39.581615 kernel: audit: type=1327 audit(1746848139.556:1008): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866666566613339323961666164383162616631313866393635363666 May 10 03:35:39.581649 kernel: audit: type=1400 audit(1746848139.559:1009): avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.593176 kernel: audit: type=1400 audit(1746848139.559:1009): avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.602304 kernel: audit: type=1400 audit(1746848139.559:1009): avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.607308 kernel: audit: type=1400 audit(1746848139.559:1009): avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.619292 kernel: audit: type=1400 audit(1746848139.559:1009): avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.619376 kernel: audit: type=1400 audit(1746848139.559:1009): avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.619396 kernel: audit: type=1400 audit(1746848139.559:1009): avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.559000 audit: BPF prog-id=136 op=LOAD May 10 03:35:39.559000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00025fba8 items=0 ppid=2507 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:39.559000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866666566613339323961666164383162616631313866393635363666 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.564000 audit: BPF prog-id=137 op=LOAD May 10 03:35:39.564000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00025fbf8 items=0 ppid=2507 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:39.564000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866666566613339323961666164383162616631313866393635363666 May 10 03:35:39.573000 audit: BPF prog-id=137 op=UNLOAD May 10 03:35:39.573000 audit: BPF prog-id=136 op=UNLOAD May 10 03:35:39.573000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { perfmon } for pid=3124 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit[3124]: AVC avc: denied { bpf } for pid=3124 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:39.573000 audit: BPF prog-id=138 op=LOAD May 10 03:35:39.573000 audit[3124]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00025fc88 items=0 ppid=2507 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:39.573000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866666566613339323961666164383162616631313866393635363666 May 10 03:35:39.633785 env[1150]: time="2025-05-10T03:35:39.633754157Z" level=info msg="StartContainer for \"8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879\" returns successfully" May 10 03:35:39.711437 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 10 03:35:39.711549 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 10 03:35:40.004414 env[1150]: time="2025-05-10T03:35:40.004380356Z" level=info msg="StopPodSandbox for \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\"" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.058 [INFO][3184] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.059 [INFO][3184] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" iface="eth0" netns="/var/run/netns/cni-2af8fdef-2622-7988-8bf4-edb71d63b5d8" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.059 [INFO][3184] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" iface="eth0" netns="/var/run/netns/cni-2af8fdef-2622-7988-8bf4-edb71d63b5d8" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.060 [INFO][3184] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" iface="eth0" netns="/var/run/netns/cni-2af8fdef-2622-7988-8bf4-edb71d63b5d8" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.060 [INFO][3184] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.060 [INFO][3184] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.082 [INFO][3196] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.082 [INFO][3196] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.082 [INFO][3196] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.091 [WARNING][3196] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.091 [INFO][3196] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.093 [INFO][3196] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:40.097692 env[1150]: 2025-05-10 03:35:40.096 [INFO][3184] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:40.098398 env[1150]: time="2025-05-10T03:35:40.097887711Z" level=info msg="TearDown network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\" successfully" May 10 03:35:40.098398 env[1150]: time="2025-05-10T03:35:40.097918318Z" level=info msg="StopPodSandbox for \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\" returns successfully" May 10 03:35:40.099342 env[1150]: time="2025-05-10T03:35:40.099252154Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7899b5db6d-kf5bg,Uid:e1fb9b91-17d3-445c-8a9b-1b2aeb70a534,Namespace:calico-apiserver,Attempt:1,}" May 10 03:35:40.238405 systemd-networkd[991]: calibcaa7d44340: Link UP May 10 03:35:40.242903 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 03:35:40.242960 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibcaa7d44340: link becomes ready May 10 03:35:40.243165 systemd-networkd[991]: calibcaa7d44340: Gained carrier May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.140 [INFO][3209] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.151 [INFO][3209] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0 calico-apiserver-7899b5db6d- calico-apiserver e1fb9b91-17d3-445c-8a9b-1b2aeb70a534 756 0 2025-05-10 03:35:10 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7899b5db6d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-13802d7031.novalocal calico-apiserver-7899b5db6d-kf5bg eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibcaa7d44340 [] []}} ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-kf5bg" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.151 [INFO][3209] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-kf5bg" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.180 [INFO][3221] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" HandleID="k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.190 [INFO][3221] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" HandleID="k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00031b730), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-13802d7031.novalocal", "pod":"calico-apiserver-7899b5db6d-kf5bg", "timestamp":"2025-05-10 03:35:40.180231486 +0000 UTC"}, Hostname:"ci-3510-3-7-n-13802d7031.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.190 [INFO][3221] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.190 [INFO][3221] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.190 [INFO][3221] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-13802d7031.novalocal' May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.193 [INFO][3221] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.200 [INFO][3221] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.205 [INFO][3221] ipam/ipam.go 489: Trying affinity for 192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.206 [INFO][3221] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.209 [INFO][3221] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.209 [INFO][3221] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.210 [INFO][3221] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.216 [INFO][3221] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.227 [INFO][3221] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.65/26] block=192.168.125.64/26 handle="k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.227 [INFO][3221] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.65/26] handle="k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.227 [INFO][3221] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:40.266858 env[1150]: 2025-05-10 03:35:40.227 [INFO][3221] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.65/26] IPv6=[] ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" HandleID="k8s-pod-network.870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.268666 env[1150]: 2025-05-10 03:35:40.229 [INFO][3209] cni-plugin/k8s.go 386: Populated endpoint ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-kf5bg" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0", GenerateName:"calico-apiserver-7899b5db6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1fb9b91-17d3-445c-8a9b-1b2aeb70a534", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7899b5db6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"", Pod:"calico-apiserver-7899b5db6d-kf5bg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibcaa7d44340", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:40.268666 env[1150]: 2025-05-10 03:35:40.229 [INFO][3209] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.65/32] ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-kf5bg" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.268666 env[1150]: 2025-05-10 03:35:40.229 [INFO][3209] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibcaa7d44340 ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-kf5bg" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.268666 env[1150]: 2025-05-10 03:35:40.243 [INFO][3209] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-kf5bg" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.268666 env[1150]: 2025-05-10 03:35:40.249 [INFO][3209] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-kf5bg" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0", GenerateName:"calico-apiserver-7899b5db6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1fb9b91-17d3-445c-8a9b-1b2aeb70a534", ResourceVersion:"756", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7899b5db6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea", Pod:"calico-apiserver-7899b5db6d-kf5bg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibcaa7d44340", MAC:"a2:20:c3:c8:eb:ce", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:40.268666 env[1150]: 2025-05-10 03:35:40.262 [INFO][3209] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-kf5bg" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:40.298511 env[1150]: time="2025-05-10T03:35:40.298442331Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:40.298511 env[1150]: time="2025-05-10T03:35:40.298484231Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:40.298706 env[1150]: time="2025-05-10T03:35:40.298498237Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:40.298872 env[1150]: time="2025-05-10T03:35:40.298830283Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea pid=3255 runtime=io.containerd.runc.v2 May 10 03:35:40.316265 systemd[1]: Started cri-containerd-870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea.scope. May 10 03:35:40.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit: BPF prog-id=139 op=LOAD May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:40.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306464343737663530353164383135343134373131323739316161 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:40.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306464343737663530353164383135343134373131323739316161 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit: BPF prog-id=140 op=LOAD May 10 03:35:40.341000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000269ce0 items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:40.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306464343737663530353164383135343134373131323739316161 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit: BPF prog-id=141 op=LOAD May 10 03:35:40.341000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000269d28 items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:40.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306464343737663530353164383135343134373131323739316161 May 10 03:35:40.341000 audit: BPF prog-id=141 op=UNLOAD May 10 03:35:40.341000 audit: BPF prog-id=140 op=UNLOAD May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { perfmon } for pid=3265 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit[3265]: AVC avc: denied { bpf } for pid=3265 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:40.341000 audit: BPF prog-id=142 op=LOAD May 10 03:35:40.341000 audit[3265]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ee138 items=0 ppid=3255 pid=3265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:40.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306464343737663530353164383135343134373131323739316161 May 10 03:35:40.374769 env[1150]: time="2025-05-10T03:35:40.374734456Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7899b5db6d-kf5bg,Uid:e1fb9b91-17d3-445c-8a9b-1b2aeb70a534,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea\"" May 10 03:35:40.376513 env[1150]: time="2025-05-10T03:35:40.376491509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 03:35:40.424117 systemd[1]: run-netns-cni\x2d2af8fdef\x2d2622\x2d7988\x2d8bf4\x2dedb71d63b5d8.mount: Deactivated successfully. May 10 03:35:41.006858 env[1150]: time="2025-05-10T03:35:41.006033486Z" level=info msg="StopPodSandbox for \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\"" May 10 03:35:41.127713 kubelet[2031]: I0510 03:35:41.127651 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-gbsvm" podStartSLOduration=2.969475058 podStartE2EDuration="31.127621568s" podCreationTimestamp="2025-05-10 03:35:10 +0000 UTC" firstStartedPulling="2025-05-10 03:35:11.315427103 +0000 UTC m=+22.442722394" lastFinishedPulling="2025-05-10 03:35:39.473573613 +0000 UTC m=+50.600868904" observedRunningTime="2025-05-10 03:35:40.283479538 +0000 UTC m=+51.410774829" watchObservedRunningTime="2025-05-10 03:35:41.127621568 +0000 UTC m=+52.254916869" May 10 03:35:41.173000 audit[3351]: AVC avc: denied { write } for pid=3351 comm="tee" name="fd" dev="proc" ino=26864 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 03:35:41.173000 audit[3351]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdf9af99fd a2=241 a3=1b6 items=1 ppid=3325 pid=3351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.128 [INFO][3313] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.129 [INFO][3313] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" iface="eth0" netns="/var/run/netns/cni-24b060d7-f19e-832d-be3e-60bd3925556a" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.129 [INFO][3313] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" iface="eth0" netns="/var/run/netns/cni-24b060d7-f19e-832d-be3e-60bd3925556a" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.130 [INFO][3313] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" iface="eth0" netns="/var/run/netns/cni-24b060d7-f19e-832d-be3e-60bd3925556a" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.130 [INFO][3313] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.130 [INFO][3313] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.159 [INFO][3355] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.159 [INFO][3355] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.159 [INFO][3355] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.174 [WARNING][3355] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.174 [INFO][3355] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.176 [INFO][3355] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:41.178106 env[1150]: 2025-05-10 03:35:41.177 [INFO][3313] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:41.184501 env[1150]: time="2025-05-10T03:35:41.178247274Z" level=info msg="TearDown network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\" successfully" May 10 03:35:41.184501 env[1150]: time="2025-05-10T03:35:41.178293992Z" level=info msg="StopPodSandbox for \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\" returns successfully" May 10 03:35:41.184501 env[1150]: time="2025-05-10T03:35:41.178838258Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7899b5db6d-v9nrp,Uid:38cb6e2c-c2a0-409b-9230-a9cc8785c2cf,Namespace:calico-apiserver,Attempt:1,}" May 10 03:35:41.183119 systemd[1]: run-netns-cni\x2d24b060d7\x2df19e\x2d832d\x2dbe3e\x2d60bd3925556a.mount: Deactivated successfully. May 10 03:35:41.173000 audit: CWD cwd="/etc/service/enabled/bird/log" May 10 03:35:41.173000 audit: PATH item=0 name="/dev/fd/63" inode=26549 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:35:41.173000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 03:35:41.258000 audit[3388]: AVC avc: denied { write } for pid=3388 comm="tee" name="fd" dev="proc" ino=26914 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 03:35:41.258000 audit[3388]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddbe0d9fc a2=241 a3=1b6 items=1 ppid=3334 pid=3388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.258000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 10 03:35:41.281000 audit[3399]: AVC avc: denied { write } for pid=3399 comm="tee" name="fd" dev="proc" ino=26599 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 03:35:41.281000 audit[3399]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff8738d9fc a2=241 a3=1b6 items=1 ppid=3336 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.281000 audit: CWD cwd="/etc/service/enabled/confd/log" May 10 03:35:41.281000 audit: PATH item=0 name="/dev/fd/63" inode=26911 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:35:41.281000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 03:35:41.258000 audit: PATH item=0 name="/dev/fd/63" inode=26903 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:35:41.258000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 03:35:41.288604 systemd-networkd[991]: calibcaa7d44340: Gained IPv6LL May 10 03:35:41.339000 audit[3390]: AVC avc: denied { write } for pid=3390 comm="tee" name="fd" dev="proc" ino=26974 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 03:35:41.339000 audit[3390]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffefb0079fe a2=241 a3=1b6 items=1 ppid=3329 pid=3390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.339000 audit: CWD cwd="/etc/service/enabled/cni/log" May 10 03:35:41.339000 audit: PATH item=0 name="/dev/fd/63" inode=26906 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:35:41.339000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 03:35:41.342000 audit[3402]: AVC avc: denied { write } for pid=3402 comm="tee" name="fd" dev="proc" ino=26605 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 03:35:41.342000 audit[3402]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeebc8a9fc a2=241 a3=1b6 items=1 ppid=3330 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.342000 audit: CWD cwd="/etc/service/enabled/felix/log" May 10 03:35:41.342000 audit: PATH item=0 name="/dev/fd/63" inode=26918 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:35:41.342000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 03:35:41.363000 audit[3406]: AVC avc: denied { write } for pid=3406 comm="tee" name="fd" dev="proc" ino=26610 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 03:35:41.363000 audit[3406]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff2d2d39ed a2=241 a3=1b6 items=1 ppid=3339 pid=3406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.363000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 10 03:35:41.363000 audit: PATH item=0 name="/dev/fd/63" inode=26920 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:35:41.363000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 03:35:41.365000 audit[3423]: AVC avc: denied { write } for pid=3423 comm="tee" name="fd" dev="proc" ino=26614 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 10 03:35:41.365000 audit[3423]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff6193e9ec a2=241 a3=1b6 items=1 ppid=3343 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.365000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 10 03:35:41.365000 audit: PATH item=0 name="/dev/fd/63" inode=26963 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 10 03:35:41.365000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 10 03:35:41.421996 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.ZXbdoY.mount: Deactivated successfully. May 10 03:35:41.447075 systemd-networkd[991]: cali5f0ab95fd9e: Link UP May 10 03:35:41.451422 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 03:35:41.451517 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5f0ab95fd9e: link becomes ready May 10 03:35:41.451671 systemd-networkd[991]: cali5f0ab95fd9e: Gained carrier May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.238 [INFO][3373] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.253 [INFO][3373] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0 calico-apiserver-7899b5db6d- calico-apiserver 38cb6e2c-c2a0-409b-9230-a9cc8785c2cf 766 0 2025-05-10 03:35:10 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7899b5db6d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510-3-7-n-13802d7031.novalocal calico-apiserver-7899b5db6d-v9nrp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5f0ab95fd9e [] []}} ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-v9nrp" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.253 [INFO][3373] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-v9nrp" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.373 [INFO][3413] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" HandleID="k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.398 [INFO][3413] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" HandleID="k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000312a50), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510-3-7-n-13802d7031.novalocal", "pod":"calico-apiserver-7899b5db6d-v9nrp", "timestamp":"2025-05-10 03:35:41.372973705 +0000 UTC"}, Hostname:"ci-3510-3-7-n-13802d7031.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.398 [INFO][3413] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.398 [INFO][3413] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.398 [INFO][3413] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-13802d7031.novalocal' May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.401 [INFO][3413] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.407 [INFO][3413] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.412 [INFO][3413] ipam/ipam.go 489: Trying affinity for 192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.415 [INFO][3413] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.419 [INFO][3413] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.419 [INFO][3413] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.428 [INFO][3413] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.433 [INFO][3413] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.441 [INFO][3413] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.66/26] block=192.168.125.64/26 handle="k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.441 [INFO][3413] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.66/26] handle="k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.441 [INFO][3413] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:41.472422 env[1150]: 2025-05-10 03:35:41.441 [INFO][3413] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.66/26] IPv6=[] ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" HandleID="k8s-pod-network.2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.473235 env[1150]: 2025-05-10 03:35:41.443 [INFO][3373] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-v9nrp" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0", GenerateName:"calico-apiserver-7899b5db6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"38cb6e2c-c2a0-409b-9230-a9cc8785c2cf", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7899b5db6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"", Pod:"calico-apiserver-7899b5db6d-v9nrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f0ab95fd9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:41.473235 env[1150]: 2025-05-10 03:35:41.443 [INFO][3373] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.66/32] ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-v9nrp" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.473235 env[1150]: 2025-05-10 03:35:41.443 [INFO][3373] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5f0ab95fd9e ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-v9nrp" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.473235 env[1150]: 2025-05-10 03:35:41.450 [INFO][3373] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-v9nrp" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.473235 env[1150]: 2025-05-10 03:35:41.458 [INFO][3373] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-v9nrp" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0", GenerateName:"calico-apiserver-7899b5db6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"38cb6e2c-c2a0-409b-9230-a9cc8785c2cf", ResourceVersion:"766", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7899b5db6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df", Pod:"calico-apiserver-7899b5db6d-v9nrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f0ab95fd9e", MAC:"de:6d:eb:1a:aa:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:41.473235 env[1150]: 2025-05-10 03:35:41.471 [INFO][3373] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df" Namespace="calico-apiserver" Pod="calico-apiserver-7899b5db6d-v9nrp" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:41.488538 env[1150]: time="2025-05-10T03:35:41.488469493Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:41.488844 env[1150]: time="2025-05-10T03:35:41.488778335Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:41.489049 env[1150]: time="2025-05-10T03:35:41.489013798Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:41.489971 env[1150]: time="2025-05-10T03:35:41.489499464Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df pid=3471 runtime=io.containerd.runc.v2 May 10 03:35:41.536944 systemd[1]: Started cri-containerd-2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df.scope. May 10 03:35:41.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.567000 audit: BPF prog-id=143 op=LOAD May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3471 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393462653438623964366661316266313132616462643337313161 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3471 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393462653438623964366661316266313132616462643337313161 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit: BPF prog-id=144 op=LOAD May 10 03:35:41.568000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000301050 items=0 ppid=3471 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393462653438623964366661316266313132616462643337313161 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit: BPF prog-id=145 op=LOAD May 10 03:35:41.568000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000301098 items=0 ppid=3471 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393462653438623964366661316266313132616462643337313161 May 10 03:35:41.568000 audit: BPF prog-id=145 op=UNLOAD May 10 03:35:41.568000 audit: BPF prog-id=144 op=UNLOAD May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.568000 audit: BPF prog-id=146 op=LOAD May 10 03:35:41.568000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003014a8 items=0 ppid=3471 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236393462653438623964366661316266313132616462643337313161 May 10 03:35:41.621311 env[1150]: time="2025-05-10T03:35:41.621226682Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7899b5db6d-v9nrp,Uid:38cb6e2c-c2a0-409b-9230-a9cc8785c2cf,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df\"" May 10 03:35:41.809000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.809000 audit: BPF prog-id=147 op=LOAD May 10 03:35:41.809000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc33c56770 a2=98 a3=3 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.809000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.810000 audit: BPF prog-id=147 op=UNLOAD May 10 03:35:41.811000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit: BPF prog-id=148 op=LOAD May 10 03:35:41.811000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc33c56550 a2=74 a3=540051 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.811000 audit: BPF prog-id=148 op=UNLOAD May 10 03:35:41.811000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.811000 audit: BPF prog-id=149 op=LOAD May 10 03:35:41.811000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc33c56580 a2=94 a3=2 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.811000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.812000 audit: BPF prog-id=149 op=UNLOAD May 10 03:35:41.928000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.928000 audit: BPF prog-id=150 op=LOAD May 10 03:35:41.928000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc33c56440 a2=40 a3=1 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.928000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.929000 audit: BPF prog-id=150 op=UNLOAD May 10 03:35:41.929000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.929000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc33c56510 a2=50 a3=7ffc33c565f0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.929000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.939000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.939000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc33c56450 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.939000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.939000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.939000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc33c56480 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.939000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.939000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.939000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc33c56390 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.939000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.939000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.939000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc33c564a0 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.939000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.940000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.940000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc33c56480 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.940000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.940000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc33c56470 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.940000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.940000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc33c564a0 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.940000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.940000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc33c56480 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.940000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.940000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc33c564a0 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.940000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.940000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc33c56470 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.940000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.941000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc33c564e0 a2=28 a3=0 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.941000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.941000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc33c56290 a2=50 a3=1 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.941000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.941000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.941000 audit: BPF prog-id=151 op=LOAD May 10 03:35:41.941000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc33c56290 a2=94 a3=5 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.941000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.942000 audit: BPF prog-id=151 op=UNLOAD May 10 03:35:41.942000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc33c56340 a2=50 a3=1 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.942000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc33c56460 a2=4 a3=38 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.942000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.942000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 03:35:41.942000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc33c564b0 a2=94 a3=6 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.942000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.943000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.943000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 03:35:41.943000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc33c55c60 a2=94 a3=83 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.943000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.944000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { perfmon } for pid=3542 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { bpf } for pid=3542 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.944000 audit[3542]: AVC avc: denied { confidentiality } for pid=3542 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 03:35:41.944000 audit[3542]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc33c55c60 a2=94 a3=83 items=0 ppid=3331 pid=3542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.944000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 10 03:35:41.951000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.951000 audit: BPF prog-id=152 op=LOAD May 10 03:35:41.951000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6e784c10 a2=98 a3=1999999999999999 items=0 ppid=3331 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.951000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 03:35:41.952000 audit: BPF prog-id=152 op=UNLOAD May 10 03:35:41.952000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit: BPF prog-id=153 op=LOAD May 10 03:35:41.952000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6e784af0 a2=74 a3=ffff items=0 ppid=3331 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.952000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 03:35:41.952000 audit: BPF prog-id=153 op=UNLOAD May 10 03:35:41.952000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { perfmon } for pid=3545 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit[3545]: AVC avc: denied { bpf } for pid=3545 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:41.952000 audit: BPF prog-id=154 op=LOAD May 10 03:35:41.952000 audit[3545]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6e784b30 a2=40 a3=7ffe6e784d10 items=0 ppid=3331 pid=3545 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:41.952000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 10 03:35:41.952000 audit: BPF prog-id=154 op=UNLOAD May 10 03:35:42.016000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit: BPF prog-id=155 op=LOAD May 10 03:35:42.016000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdcd993f20 a2=98 a3=100 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.016000 audit: BPF prog-id=155 op=UNLOAD May 10 03:35:42.016000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.016000 audit: BPF prog-id=156 op=LOAD May 10 03:35:42.016000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdcd993d30 a2=74 a3=540051 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.016000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.017000 audit: BPF prog-id=156 op=UNLOAD May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit: BPF prog-id=157 op=LOAD May 10 03:35:42.017000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffdcd993d60 a2=94 a3=2 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.017000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.017000 audit: BPF prog-id=157 op=UNLOAD May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdcd993c30 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.017000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcd993c60 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.017000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcd993b70 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.017000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdcd993c80 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.017000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.017000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.017000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdcd993c60 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.017000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdcd993c50 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.018000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdcd993c80 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.018000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcd993c60 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.018000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcd993c80 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.018000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffdcd993c50 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.018000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffdcd993cc0 a2=28 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.018000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.018000 audit: BPF prog-id=158 op=LOAD May 10 03:35:42.018000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdcd993b30 a2=40 a3=0 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.018000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.018000 audit: BPF prog-id=158 op=UNLOAD May 10 03:35:42.026168 systemd-networkd[991]: vxlan.calico: Link UP May 10 03:35:42.026177 systemd-networkd[991]: vxlan.calico: Gained carrier May 10 03:35:42.026000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffdcd993b20 a2=50 a3=2800 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.026000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffdcd993b20 a2=50 a3=2800 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.026000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.026000 audit: BPF prog-id=159 op=LOAD May 10 03:35:42.026000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdcd993340 a2=94 a3=2 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.026000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.027000 audit: BPF prog-id=159 op=UNLOAD May 10 03:35:42.027000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { perfmon } for pid=3570 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit[3570]: AVC avc: denied { bpf } for pid=3570 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.027000 audit: BPF prog-id=160 op=LOAD May 10 03:35:42.027000 audit[3570]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffdcd993440 a2=94 a3=30 items=0 ppid=3331 pid=3570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.027000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.045000 audit: BPF prog-id=161 op=LOAD May 10 03:35:42.045000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd167ae120 a2=98 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.045000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.045000 audit: BPF prog-id=161 op=UNLOAD May 10 03:35:42.046000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit: BPF prog-id=162 op=LOAD May 10 03:35:42.046000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd167adf00 a2=74 a3=540051 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.046000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.046000 audit: BPF prog-id=162 op=UNLOAD May 10 03:35:42.046000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.046000 audit: BPF prog-id=163 op=LOAD May 10 03:35:42.046000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd167adf30 a2=94 a3=2 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.046000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.046000 audit: BPF prog-id=163 op=UNLOAD May 10 03:35:42.174000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.174000 audit: BPF prog-id=164 op=LOAD May 10 03:35:42.174000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd167addf0 a2=40 a3=1 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.174000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.175000 audit: BPF prog-id=164 op=UNLOAD May 10 03:35:42.175000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.175000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd167adec0 a2=50 a3=7ffd167adfa0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.175000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.190000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.190000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd167ade00 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.190000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.190000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.190000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd167ade30 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.190000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.190000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.190000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd167add40 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.190000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.190000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.190000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd167ade50 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.190000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.191000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.191000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd167ade30 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.191000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.191000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd167ade20 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.191000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.191000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd167ade50 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.191000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.191000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd167ade30 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.191000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.191000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd167ade50 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.191000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.191000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd167ade20 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd167ade90 a2=28 a3=0 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd167adc40 a2=50 a3=1 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.192000 audit: BPF prog-id=165 op=LOAD May 10 03:35:42.192000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd167adc40 a2=94 a3=5 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.192000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.193000 audit: BPF prog-id=165 op=UNLOAD May 10 03:35:42.193000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd167adcf0 a2=50 a3=1 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd167ade10 a2=4 a3=38 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.193000 audit[3577]: AVC avc: denied { confidentiality } for pid=3577 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 03:35:42.193000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd167ade60 a2=94 a3=6 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.193000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.194000 audit[3577]: AVC avc: denied { confidentiality } for pid=3577 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 03:35:42.194000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd167ad610 a2=94 a3=83 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.194000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { perfmon } for pid=3577 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.195000 audit[3577]: AVC avc: denied { confidentiality } for pid=3577 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 10 03:35:42.195000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd167ad610 a2=94 a3=83 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.195000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.196000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.196000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd167af050 a2=10 a3=f0f1 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.196000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.196000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.196000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd167aeef0 a2=10 a3=3 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.196000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.196000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.196000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd167aee90 a2=10 a3=3 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.196000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.196000 audit[3577]: AVC avc: denied { bpf } for pid=3577 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:42.196000 audit[3577]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd167aee90 a2=10 a3=7 items=0 ppid=3331 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.196000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 10 03:35:42.205000 audit: BPF prog-id=160 op=UNLOAD May 10 03:35:42.269000 audit[3603]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3603 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:42.269000 audit[3603]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd079746b0 a2=0 a3=7ffd0797469c items=0 ppid=3331 pid=3603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.269000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:42.293000 audit[3602]: NETFILTER_CFG table=raw:98 family=2 entries=21 op=nft_register_chain pid=3602 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:42.293000 audit[3602]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fff4dc5a4d0 a2=0 a3=7fff4dc5a4bc items=0 ppid=3331 pid=3602 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.293000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:42.295000 audit[3605]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3605 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:42.295000 audit[3605]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffc8b0dfe10 a2=0 a3=7ffc8b0dfdfc items=0 ppid=3331 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.295000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:42.302000 audit[3604]: NETFILTER_CFG table=filter:100 family=2 entries=101 op=nft_register_chain pid=3604 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:42.302000 audit[3604]: SYSCALL arch=c000003e syscall=46 success=yes exit=58176 a0=3 a1=7ffdbd8744f0 a2=0 a3=7ffdbd8744dc items=0 ppid=3331 pid=3604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:42.302000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:42.889698 systemd-networkd[991]: cali5f0ab95fd9e: Gained IPv6LL May 10 03:35:43.005177 env[1150]: time="2025-05-10T03:35:43.004852804Z" level=info msg="StopPodSandbox for \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\"" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.092 [INFO][3627] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.092 [INFO][3627] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" iface="eth0" netns="/var/run/netns/cni-cfaa8a70-6781-436e-0614-a507f5310d73" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.092 [INFO][3627] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" iface="eth0" netns="/var/run/netns/cni-cfaa8a70-6781-436e-0614-a507f5310d73" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.092 [INFO][3627] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" iface="eth0" netns="/var/run/netns/cni-cfaa8a70-6781-436e-0614-a507f5310d73" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.092 [INFO][3627] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.092 [INFO][3627] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.127 [INFO][3634] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.127 [INFO][3634] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.127 [INFO][3634] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.134 [WARNING][3634] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.134 [INFO][3634] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.136 [INFO][3634] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:43.138670 env[1150]: 2025-05-10 03:35:43.137 [INFO][3627] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:43.144178 env[1150]: time="2025-05-10T03:35:43.141425571Z" level=info msg="TearDown network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\" successfully" May 10 03:35:43.144178 env[1150]: time="2025-05-10T03:35:43.141471798Z" level=info msg="StopPodSandbox for \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\" returns successfully" May 10 03:35:43.143685 systemd[1]: run-netns-cni\x2dcfaa8a70\x2d6781\x2d436e\x2d0614\x2da507f5310d73.mount: Deactivated successfully. May 10 03:35:43.145933 env[1150]: time="2025-05-10T03:35:43.145430590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-765b4476b7-smp42,Uid:cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7,Namespace:calico-system,Attempt:1,}" May 10 03:35:43.336231 systemd-networkd[991]: cali052d349ff17: Link UP May 10 03:35:43.336417 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali052d349ff17: link becomes ready May 10 03:35:43.336952 systemd-networkd[991]: cali052d349ff17: Gained carrier May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.223 [INFO][3643] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0 calico-kube-controllers-765b4476b7- calico-system cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7 776 0 2025-05-10 03:35:11 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:765b4476b7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510-3-7-n-13802d7031.novalocal calico-kube-controllers-765b4476b7-smp42 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali052d349ff17 [] []}} ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Namespace="calico-system" Pod="calico-kube-controllers-765b4476b7-smp42" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.223 [INFO][3643] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Namespace="calico-system" Pod="calico-kube-controllers-765b4476b7-smp42" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.261 [INFO][3655] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" HandleID="k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.271 [INFO][3655] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" HandleID="k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002e0f30), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-13802d7031.novalocal", "pod":"calico-kube-controllers-765b4476b7-smp42", "timestamp":"2025-05-10 03:35:43.260989109 +0000 UTC"}, Hostname:"ci-3510-3-7-n-13802d7031.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.271 [INFO][3655] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.271 [INFO][3655] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.272 [INFO][3655] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-13802d7031.novalocal' May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.282 [INFO][3655] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.288 [INFO][3655] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.301 [INFO][3655] ipam/ipam.go 489: Trying affinity for 192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.304 [INFO][3655] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.311 [INFO][3655] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.311 [INFO][3655] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.313 [INFO][3655] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6 May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.319 [INFO][3655] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.331 [INFO][3655] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.67/26] block=192.168.125.64/26 handle="k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.331 [INFO][3655] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.67/26] handle="k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.331 [INFO][3655] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:43.358541 env[1150]: 2025-05-10 03:35:43.331 [INFO][3655] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.67/26] IPv6=[] ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" HandleID="k8s-pod-network.0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.359250 env[1150]: 2025-05-10 03:35:43.332 [INFO][3643] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Namespace="calico-system" Pod="calico-kube-controllers-765b4476b7-smp42" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0", GenerateName:"calico-kube-controllers-765b4476b7-", Namespace:"calico-system", SelfLink:"", UID:"cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"765b4476b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"", Pod:"calico-kube-controllers-765b4476b7-smp42", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali052d349ff17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:43.359250 env[1150]: 2025-05-10 03:35:43.332 [INFO][3643] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.67/32] ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Namespace="calico-system" Pod="calico-kube-controllers-765b4476b7-smp42" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.359250 env[1150]: 2025-05-10 03:35:43.332 [INFO][3643] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali052d349ff17 ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Namespace="calico-system" Pod="calico-kube-controllers-765b4476b7-smp42" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.359250 env[1150]: 2025-05-10 03:35:43.335 [INFO][3643] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Namespace="calico-system" Pod="calico-kube-controllers-765b4476b7-smp42" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.359250 env[1150]: 2025-05-10 03:35:43.339 [INFO][3643] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Namespace="calico-system" Pod="calico-kube-controllers-765b4476b7-smp42" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0", GenerateName:"calico-kube-controllers-765b4476b7-", Namespace:"calico-system", SelfLink:"", UID:"cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7", ResourceVersion:"776", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"765b4476b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6", Pod:"calico-kube-controllers-765b4476b7-smp42", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali052d349ff17", MAC:"b6:6b:71:7e:a3:82", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:43.359250 env[1150]: 2025-05-10 03:35:43.357 [INFO][3643] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6" Namespace="calico-system" Pod="calico-kube-controllers-765b4476b7-smp42" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:43.382967 env[1150]: time="2025-05-10T03:35:43.382771399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:43.382967 env[1150]: time="2025-05-10T03:35:43.382811765Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:43.382967 env[1150]: time="2025-05-10T03:35:43.382825631Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:43.383213 env[1150]: time="2025-05-10T03:35:43.382992887Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6 pid=3683 runtime=io.containerd.runc.v2 May 10 03:35:43.380000 audit[3675]: NETFILTER_CFG table=filter:101 family=2 entries=42 op=nft_register_chain pid=3675 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:43.380000 audit[3675]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7ffdbcfa3530 a2=0 a3=7ffdbcfa351c items=0 ppid=3331 pid=3675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:43.380000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:43.408867 systemd[1]: Started cri-containerd-0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6.scope. May 10 03:35:43.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.445000 audit: BPF prog-id=166 op=LOAD May 10 03:35:43.445000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.445000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3683 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:43.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063623839396431373561333634633466666333376238376663623831 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3683 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:43.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063623839396431373561333634633466666333376238376663623831 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.446000 audit: BPF prog-id=167 op=LOAD May 10 03:35:43.446000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000221090 items=0 ppid=3683 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:43.446000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063623839396431373561333634633466666333376238376663623831 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit: BPF prog-id=168 op=LOAD May 10 03:35:43.447000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002210d8 items=0 ppid=3683 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:43.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063623839396431373561333634633466666333376238376663623831 May 10 03:35:43.447000 audit: BPF prog-id=168 op=UNLOAD May 10 03:35:43.447000 audit: BPF prog-id=167 op=UNLOAD May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { perfmon } for pid=3693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit[3693]: AVC avc: denied { bpf } for pid=3693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:43.447000 audit: BPF prog-id=169 op=LOAD May 10 03:35:43.447000 audit[3693]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002214e8 items=0 ppid=3683 pid=3693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:43.447000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063623839396431373561333634633466666333376238376663623831 May 10 03:35:43.493693 env[1150]: time="2025-05-10T03:35:43.493647302Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-765b4476b7-smp42,Uid:cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7,Namespace:calico-system,Attempt:1,} returns sandbox id \"0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6\"" May 10 03:35:44.007778 env[1150]: time="2025-05-10T03:35:44.007638832Z" level=info msg="StopPodSandbox for \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\"" May 10 03:35:44.009158 env[1150]: time="2025-05-10T03:35:44.009109283Z" level=info msg="StopPodSandbox for \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\"" May 10 03:35:44.040482 systemd-networkd[991]: vxlan.calico: Gained IPv6LL May 10 03:35:44.143885 systemd[1]: run-containerd-runc-k8s.io-0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6-runc.UQtZrl.mount: Deactivated successfully. May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.093 [INFO][3744] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.093 [INFO][3744] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" iface="eth0" netns="/var/run/netns/cni-21043823-51dd-e971-1c37-489de53e360d" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.093 [INFO][3744] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" iface="eth0" netns="/var/run/netns/cni-21043823-51dd-e971-1c37-489de53e360d" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.094 [INFO][3744] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" iface="eth0" netns="/var/run/netns/cni-21043823-51dd-e971-1c37-489de53e360d" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.094 [INFO][3744] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.094 [INFO][3744] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.158 [INFO][3759] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.159 [INFO][3759] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.159 [INFO][3759] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.166 [WARNING][3759] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.167 [INFO][3759] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.174 [INFO][3759] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:44.176880 env[1150]: 2025-05-10 03:35:44.175 [INFO][3744] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:44.180211 systemd[1]: run-netns-cni\x2d21043823\x2d51dd\x2de971\x2d1c37\x2d489de53e360d.mount: Deactivated successfully. May 10 03:35:44.182088 env[1150]: time="2025-05-10T03:35:44.181456750Z" level=info msg="TearDown network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\" successfully" May 10 03:35:44.182204 env[1150]: time="2025-05-10T03:35:44.182185323Z" level=info msg="StopPodSandbox for \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\" returns successfully" May 10 03:35:44.184507 env[1150]: time="2025-05-10T03:35:44.184468065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xkbzj,Uid:f901b9fc-1fd8-4d58-b6a2-96852a615b4b,Namespace:calico-system,Attempt:1,}" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.157 [INFO][3754] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.157 [INFO][3754] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" iface="eth0" netns="/var/run/netns/cni-ba18909c-6659-02f9-d486-600cad112540" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.157 [INFO][3754] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" iface="eth0" netns="/var/run/netns/cni-ba18909c-6659-02f9-d486-600cad112540" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.158 [INFO][3754] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" iface="eth0" netns="/var/run/netns/cni-ba18909c-6659-02f9-d486-600cad112540" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.158 [INFO][3754] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.158 [INFO][3754] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.205 [INFO][3769] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.205 [INFO][3769] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.205 [INFO][3769] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.215 [WARNING][3769] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.215 [INFO][3769] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.229 [INFO][3769] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:44.231490 env[1150]: 2025-05-10 03:35:44.230 [INFO][3754] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:44.234606 systemd[1]: run-netns-cni\x2dba18909c\x2d6659\x2d02f9\x2dd486\x2d600cad112540.mount: Deactivated successfully. May 10 03:35:44.235516 env[1150]: time="2025-05-10T03:35:44.235484081Z" level=info msg="TearDown network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\" successfully" May 10 03:35:44.235700 env[1150]: time="2025-05-10T03:35:44.235658058Z" level=info msg="StopPodSandbox for \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\" returns successfully" May 10 03:35:44.236557 env[1150]: time="2025-05-10T03:35:44.236520884Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fhwvv,Uid:07b0d8c4-503a-4abd-8662-ad72b8771bda,Namespace:kube-system,Attempt:1,}" May 10 03:35:44.686473 systemd-networkd[991]: cali77a6d907699: Link UP May 10 03:35:44.690288 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 03:35:44.690723 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali77a6d907699: link becomes ready May 10 03:35:44.694284 systemd-networkd[991]: cali77a6d907699: Gained carrier May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.567 [INFO][3786] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0 coredns-7db6d8ff4d- kube-system 07b0d8c4-503a-4abd-8662-ad72b8771bda 785 0 2025-05-10 03:35:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-13802d7031.novalocal coredns-7db6d8ff4d-fhwvv eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali77a6d907699 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fhwvv" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.567 [INFO][3786] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fhwvv" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.635 [INFO][3802] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" HandleID="k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.648 [INFO][3802] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" HandleID="k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000304630), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-13802d7031.novalocal", "pod":"coredns-7db6d8ff4d-fhwvv", "timestamp":"2025-05-10 03:35:44.635207242 +0000 UTC"}, Hostname:"ci-3510-3-7-n-13802d7031.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.648 [INFO][3802] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.648 [INFO][3802] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.648 [INFO][3802] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-13802d7031.novalocal' May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.651 [INFO][3802] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.655 [INFO][3802] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.661 [INFO][3802] ipam/ipam.go 489: Trying affinity for 192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.663 [INFO][3802] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.666 [INFO][3802] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.666 [INFO][3802] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.668 [INFO][3802] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5 May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.673 [INFO][3802] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.680 [INFO][3802] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.68/26] block=192.168.125.64/26 handle="k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.680 [INFO][3802] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.68/26] handle="k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.680 [INFO][3802] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:44.713694 env[1150]: 2025-05-10 03:35:44.680 [INFO][3802] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.68/26] IPv6=[] ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" HandleID="k8s-pod-network.ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.714671 env[1150]: 2025-05-10 03:35:44.682 [INFO][3786] cni-plugin/k8s.go 386: Populated endpoint ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fhwvv" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"07b0d8c4-503a-4abd-8662-ad72b8771bda", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"", Pod:"coredns-7db6d8ff4d-fhwvv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali77a6d907699", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:44.714671 env[1150]: 2025-05-10 03:35:44.682 [INFO][3786] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.68/32] ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fhwvv" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.714671 env[1150]: 2025-05-10 03:35:44.682 [INFO][3786] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali77a6d907699 ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fhwvv" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.714671 env[1150]: 2025-05-10 03:35:44.696 [INFO][3786] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fhwvv" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.714671 env[1150]: 2025-05-10 03:35:44.697 [INFO][3786] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fhwvv" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"07b0d8c4-503a-4abd-8662-ad72b8771bda", ResourceVersion:"785", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5", Pod:"coredns-7db6d8ff4d-fhwvv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali77a6d907699", MAC:"9e:3c:54:22:c9:bd", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:44.714671 env[1150]: 2025-05-10 03:35:44.711 [INFO][3786] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5" Namespace="kube-system" Pod="coredns-7db6d8ff4d-fhwvv" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:44.755163 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3c900c8033f: link becomes ready May 10 03:35:44.754481 systemd-networkd[991]: cali3c900c8033f: Link UP May 10 03:35:44.754926 systemd-networkd[991]: cali3c900c8033f: Gained carrier May 10 03:35:44.755448 env[1150]: time="2025-05-10T03:35:44.751421460Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:44.755448 env[1150]: time="2025-05-10T03:35:44.751458780Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:44.755448 env[1150]: time="2025-05-10T03:35:44.751471895Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:44.755448 env[1150]: time="2025-05-10T03:35:44.751625836Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5 pid=3834 runtime=io.containerd.runc.v2 May 10 03:35:44.756000 audit[3838]: NETFILTER_CFG table=filter:102 family=2 entries=46 op=nft_register_chain pid=3838 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:44.759679 kernel: kauditd_printk_skb: 722 callbacks suppressed May 10 03:35:44.759727 kernel: audit: type=1325 audit(1746848144.756:1171): table=filter:102 family=2 entries=46 op=nft_register_chain pid=3838 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:44.756000 audit[3838]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7fffd183cae0 a2=0 a3=7fffd183cacc items=0 ppid=3331 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.769755 kernel: audit: type=1300 audit(1746848144.756:1171): arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7fffd183cae0 a2=0 a3=7fffd183cacc items=0 ppid=3331 pid=3838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.756000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.577 [INFO][3776] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0 csi-node-driver- calico-system f901b9fc-1fd8-4d58-b6a2-96852a615b4b 784 0 2025-05-10 03:35:11 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510-3-7-n-13802d7031.novalocal csi-node-driver-xkbzj eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali3c900c8033f [] []}} ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Namespace="calico-system" Pod="csi-node-driver-xkbzj" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.578 [INFO][3776] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Namespace="calico-system" Pod="csi-node-driver-xkbzj" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.655 [INFO][3807] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" HandleID="k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.666 [INFO][3807] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" HandleID="k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000288ef0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510-3-7-n-13802d7031.novalocal", "pod":"csi-node-driver-xkbzj", "timestamp":"2025-05-10 03:35:44.655002258 +0000 UTC"}, Hostname:"ci-3510-3-7-n-13802d7031.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.666 [INFO][3807] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.681 [INFO][3807] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.681 [INFO][3807] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-13802d7031.novalocal' May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.693 [INFO][3807] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.701 [INFO][3807] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.707 [INFO][3807] ipam/ipam.go 489: Trying affinity for 192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.714 [INFO][3807] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.717 [INFO][3807] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.718 [INFO][3807] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.719 [INFO][3807] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879 May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.725 [INFO][3807] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.732 [INFO][3807] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.69/26] block=192.168.125.64/26 handle="k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.732 [INFO][3807] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.69/26] handle="k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.732 [INFO][3807] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:44.772148 env[1150]: 2025-05-10 03:35:44.732 [INFO][3807] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.69/26] IPv6=[] ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" HandleID="k8s-pod-network.321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.773043 env[1150]: 2025-05-10 03:35:44.734 [INFO][3776] cni-plugin/k8s.go 386: Populated endpoint ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Namespace="calico-system" Pod="csi-node-driver-xkbzj" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f901b9fc-1fd8-4d58-b6a2-96852a615b4b", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"", Pod:"csi-node-driver-xkbzj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3c900c8033f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:44.773043 env[1150]: 2025-05-10 03:35:44.734 [INFO][3776] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.69/32] ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Namespace="calico-system" Pod="csi-node-driver-xkbzj" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.773043 env[1150]: 2025-05-10 03:35:44.734 [INFO][3776] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3c900c8033f ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Namespace="calico-system" Pod="csi-node-driver-xkbzj" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.773043 env[1150]: 2025-05-10 03:35:44.748 [INFO][3776] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Namespace="calico-system" Pod="csi-node-driver-xkbzj" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.773043 env[1150]: 2025-05-10 03:35:44.748 [INFO][3776] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Namespace="calico-system" Pod="csi-node-driver-xkbzj" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f901b9fc-1fd8-4d58-b6a2-96852a615b4b", ResourceVersion:"784", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879", Pod:"csi-node-driver-xkbzj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3c900c8033f", MAC:"f6:9d:e8:dc:26:ef", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:44.773043 env[1150]: 2025-05-10 03:35:44.770 [INFO][3776] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879" Namespace="calico-system" Pod="csi-node-driver-xkbzj" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:44.776642 kernel: audit: type=1327 audit(1746848144.756:1171): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:44.787720 systemd[1]: Started cri-containerd-ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5.scope. May 10 03:35:44.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.808352 env[1150]: time="2025-05-10T03:35:44.808302880Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:44.808538 env[1150]: time="2025-05-10T03:35:44.808514569Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:44.808636 env[1150]: time="2025-05-10T03:35:44.808614968Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:44.808951 env[1150]: time="2025-05-10T03:35:44.808918028Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879 pid=3882 runtime=io.containerd.runc.v2 May 10 03:35:44.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814509 kernel: audit: type=1400 audit(1746848144.803:1172): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814568 kernel: audit: type=1400 audit(1746848144.803:1173): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.821356 kernel: audit: type=1400 audit(1746848144.803:1174): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.837087 kernel: audit: type=1400 audit(1746848144.803:1175): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.837156 kernel: audit: type=1400 audit(1746848144.803:1176): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.845363 kernel: audit: type=1400 audit(1746848144.803:1177): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.846763 systemd[1]: Started cri-containerd-321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879.scope. May 10 03:35:44.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.857392 kernel: audit: type=1400 audit(1746848144.803:1178): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.803000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.803000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.803000 audit: BPF prog-id=170 op=LOAD May 10 03:35:44.808000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.808000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3834 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164353834643539363764663266316564343937346137663465353836 May 10 03:35:44.808000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.808000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3834 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.808000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164353834643539363764663266316564343937346137663465353836 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.809000 audit: BPF prog-id=171 op=LOAD May 10 03:35:44.809000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9af0 items=0 ppid=3834 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.809000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164353834643539363764663266316564343937346137663465353836 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.813000 audit: BPF prog-id=172 op=LOAD May 10 03:35:44.813000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9b38 items=0 ppid=3834 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.813000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164353834643539363764663266316564343937346137663465353836 May 10 03:35:44.814000 audit: BPF prog-id=172 op=UNLOAD May 10 03:35:44.814000 audit: BPF prog-id=171 op=UNLOAD May 10 03:35:44.814000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { perfmon } for pid=3847 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit[3847]: AVC avc: denied { bpf } for pid=3847 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.814000 audit: BPF prog-id=173 op=LOAD May 10 03:35:44.814000 audit[3847]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d9f48 items=0 ppid=3834 pid=3847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164353834643539363764663266316564343937346137663465353836 May 10 03:35:44.826000 audit[3876]: NETFILTER_CFG table=filter:103 family=2 entries=46 op=nft_register_chain pid=3876 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:44.826000 audit[3876]: SYSCALL arch=c000003e syscall=46 success=yes exit=22204 a0=3 a1=7ffef08a8720 a2=0 a3=7ffef08a870c items=0 ppid=3331 pid=3876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.826000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:44.872509 env[1150]: time="2025-05-10T03:35:44.872475970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-fhwvv,Uid:07b0d8c4-503a-4abd-8662-ad72b8771bda,Namespace:kube-system,Attempt:1,} returns sandbox id \"ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5\"" May 10 03:35:44.877368 env[1150]: time="2025-05-10T03:35:44.877335419Z" level=info msg="CreateContainer within sandbox \"ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 03:35:44.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.878000 audit: BPF prog-id=174 op=LOAD May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316231623136633265383630343566626232306530396162316134 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316231623136633265383630343566626232306530396162316134 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit: BPF prog-id=175 op=LOAD May 10 03:35:44.879000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000275f50 items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316231623136633265383630343566626232306530396162316134 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit: BPF prog-id=176 op=LOAD May 10 03:35:44.879000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000275f98 items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316231623136633265383630343566626232306530396162316134 May 10 03:35:44.879000 audit: BPF prog-id=176 op=UNLOAD May 10 03:35:44.879000 audit: BPF prog-id=175 op=UNLOAD May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { perfmon } for pid=3895 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit[3895]: AVC avc: denied { bpf } for pid=3895 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.879000 audit: BPF prog-id=177 op=LOAD May 10 03:35:44.879000 audit[3895]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003503a8 items=0 ppid=3882 pid=3895 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332316231623136633265383630343566626232306530396162316134 May 10 03:35:44.889000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:44.889000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0024efa40 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:44.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:44.889000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:44.889000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d356b0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:44.889000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:44.896996 env[1150]: time="2025-05-10T03:35:44.896949173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xkbzj,Uid:f901b9fc-1fd8-4d58-b6a2-96852a615b4b,Namespace:calico-system,Attempt:1,} returns sandbox id \"321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879\"" May 10 03:35:44.908951 env[1150]: time="2025-05-10T03:35:44.908900306Z" level=info msg="CreateContainer within sandbox \"ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"317697fb51c3924ea338f4a0435e6c4a068f66276dc9534db30582512aaaf2d3\"" May 10 03:35:44.910534 env[1150]: time="2025-05-10T03:35:44.910476025Z" level=info msg="StartContainer for \"317697fb51c3924ea338f4a0435e6c4a068f66276dc9534db30582512aaaf2d3\"" May 10 03:35:44.931118 systemd[1]: Started cri-containerd-317697fb51c3924ea338f4a0435e6c4a068f66276dc9534db30582512aaaf2d3.scope. May 10 03:35:44.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.945000 audit: BPF prog-id=178 op=LOAD May 10 03:35:44.951000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.951000 audit[3932]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3834 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.951000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373639376662353163333932346561333338663461303433356536 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3834 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373639376662353163333932346561333338663461303433356536 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.952000 audit: BPF prog-id=179 op=LOAD May 10 03:35:44.952000 audit[3932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003883a0 items=0 ppid=3834 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.952000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373639376662353163333932346561333338663461303433356536 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit: BPF prog-id=180 op=LOAD May 10 03:35:44.953000 audit[3932]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003883e8 items=0 ppid=3834 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373639376662353163333932346561333338663461303433356536 May 10 03:35:44.953000 audit: BPF prog-id=180 op=UNLOAD May 10 03:35:44.953000 audit: BPF prog-id=179 op=UNLOAD May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { perfmon } for pid=3932 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit[3932]: AVC avc: denied { bpf } for pid=3932 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:44.953000 audit: BPF prog-id=181 op=LOAD May 10 03:35:44.953000 audit[3932]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003887f8 items=0 ppid=3834 pid=3932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:44.953000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331373639376662353163333932346561333338663461303433356536 May 10 03:35:44.974237 env[1150]: time="2025-05-10T03:35:44.974178179Z" level=info msg="StartContainer for \"317697fb51c3924ea338f4a0435e6c4a068f66276dc9534db30582512aaaf2d3\" returns successfully" May 10 03:35:45.193502 systemd-networkd[991]: cali052d349ff17: Gained IPv6LL May 10 03:35:45.301000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:45.301000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00de59700 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:35:45.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:35:45.301000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:45.301000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00aff5920 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:35:45.301000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:35:45.304000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:45.304000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00aff5d70 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:35:45.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:35:45.312546 kubelet[2031]: I0510 03:35:45.311515 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-fhwvv" podStartSLOduration=42.311487155 podStartE2EDuration="42.311487155s" podCreationTimestamp="2025-05-10 03:35:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 03:35:45.309863606 +0000 UTC m=+56.437158907" watchObservedRunningTime="2025-05-10 03:35:45.311487155 +0000 UTC m=+56.438782446" May 10 03:35:45.311000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:45.311000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00b670d50 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:35:45.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:35:45.325000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:45.325000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00ecea020 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:35:45.325000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:35:45.326000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:45.326000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c00bdf8630 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:35:45.326000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:35:45.336000 audit[3962]: NETFILTER_CFG table=filter:104 family=2 entries=16 op=nft_register_rule pid=3962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:45.336000 audit[3962]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe7b3ff2b0 a2=0 a3=7ffe7b3ff29c items=0 ppid=2165 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:45.336000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:45.340000 audit[3962]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3962 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:45.340000 audit[3962]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe7b3ff2b0 a2=0 a3=0 items=0 ppid=2165 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:45.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:45.356000 audit[3964]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=3964 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:45.356000 audit[3964]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd39d97370 a2=0 a3=7ffd39d9735c items=0 ppid=2165 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:45.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:45.361000 audit[3964]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3964 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:45.361000 audit[3964]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd39d97370 a2=0 a3=7ffd39d9735c items=0 ppid=2165 pid=3964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:45.361000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:46.536405 systemd-networkd[991]: cali77a6d907699: Gained IPv6LL May 10 03:35:46.792492 systemd-networkd[991]: cali3c900c8033f: Gained IPv6LL May 10 03:35:47.503105 env[1150]: time="2025-05-10T03:35:47.503068257Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:47.507011 env[1150]: time="2025-05-10T03:35:47.506988153Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:47.509825 env[1150]: time="2025-05-10T03:35:47.509805641Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:47.513193 env[1150]: time="2025-05-10T03:35:47.513172584Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:47.513909 env[1150]: time="2025-05-10T03:35:47.513886689Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 03:35:47.517546 env[1150]: time="2025-05-10T03:35:47.517520204Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 10 03:35:47.522209 env[1150]: time="2025-05-10T03:35:47.522182888Z" level=info msg="CreateContainer within sandbox \"870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 03:35:47.559478 env[1150]: time="2025-05-10T03:35:47.559435471Z" level=info msg="CreateContainer within sandbox \"870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"1063ad4d699c182ce06a358764c0c9e2985a910ab8b014759fc8cb482d7e78fd\"" May 10 03:35:47.560225 env[1150]: time="2025-05-10T03:35:47.560202025Z" level=info msg="StartContainer for \"1063ad4d699c182ce06a358764c0c9e2985a910ab8b014759fc8cb482d7e78fd\"" May 10 03:35:47.591880 systemd[1]: Started cri-containerd-1063ad4d699c182ce06a358764c0c9e2985a910ab8b014759fc8cb482d7e78fd.scope. May 10 03:35:47.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.620000 audit: BPF prog-id=182 op=LOAD May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3255 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:47.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363361643464363939633138326365303661333538373634633063 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3255 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:47.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363361643464363939633138326365303661333538373634633063 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit: BPF prog-id=183 op=LOAD May 10 03:35:47.621000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000259d10 items=0 ppid=3255 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:47.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363361643464363939633138326365303661333538373634633063 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.621000 audit: BPF prog-id=184 op=LOAD May 10 03:35:47.621000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000259d58 items=0 ppid=3255 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:47.621000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363361643464363939633138326365303661333538373634633063 May 10 03:35:47.621000 audit: BPF prog-id=184 op=UNLOAD May 10 03:35:47.621000 audit: BPF prog-id=183 op=UNLOAD May 10 03:35:47.622000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { perfmon } for pid=3978 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit[3978]: AVC avc: denied { bpf } for pid=3978 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:47.622000 audit: BPF prog-id=185 op=LOAD May 10 03:35:47.622000 audit[3978]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003c0168 items=0 ppid=3255 pid=3978 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:47.622000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363361643464363939633138326365303661333538373634633063 May 10 03:35:47.652612 env[1150]: time="2025-05-10T03:35:47.652573268Z" level=info msg="StartContainer for \"1063ad4d699c182ce06a358764c0c9e2985a910ab8b014759fc8cb482d7e78fd\" returns successfully" May 10 03:35:48.001122 env[1150]: time="2025-05-10T03:35:48.001074310Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:48.008675 env[1150]: time="2025-05-10T03:35:48.008650593Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:48.010671 env[1150]: time="2025-05-10T03:35:48.010650239Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:48.013414 env[1150]: time="2025-05-10T03:35:48.013393787Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:48.014165 env[1150]: time="2025-05-10T03:35:48.014143219Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 10 03:35:48.017751 env[1150]: time="2025-05-10T03:35:48.017719847Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 10 03:35:48.018936 env[1150]: time="2025-05-10T03:35:48.018909849Z" level=info msg="CreateContainer within sandbox \"2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 10 03:35:48.041093 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1160981195.mount: Deactivated successfully. May 10 03:35:48.050105 env[1150]: time="2025-05-10T03:35:48.050068164Z" level=info msg="CreateContainer within sandbox \"2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"db8b9ee889e26d585fea329e336a1bfd6d34e7f22dfdf0b536936f86a2a6d584\"" May 10 03:35:48.052328 env[1150]: time="2025-05-10T03:35:48.052298655Z" level=info msg="StartContainer for \"db8b9ee889e26d585fea329e336a1bfd6d34e7f22dfdf0b536936f86a2a6d584\"" May 10 03:35:48.075261 systemd[1]: Started cri-containerd-db8b9ee889e26d585fea329e336a1bfd6d34e7f22dfdf0b536936f86a2a6d584.scope. May 10 03:35:48.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.097000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit: BPF prog-id=186 op=LOAD May 10 03:35:48.098000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3471 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462386239656538383965323664353835666561333239653333366131 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3471 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462386239656538383965323664353835666561333239653333366131 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.098000 audit: BPF prog-id=187 op=LOAD May 10 03:35:48.098000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002a9a10 items=0 ppid=3471 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462386239656538383965323664353835666561333239653333366131 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit: BPF prog-id=188 op=LOAD May 10 03:35:48.099000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002a9a58 items=0 ppid=3471 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462386239656538383965323664353835666561333239653333366131 May 10 03:35:48.099000 audit: BPF prog-id=188 op=UNLOAD May 10 03:35:48.099000 audit: BPF prog-id=187 op=UNLOAD May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:48.099000 audit: BPF prog-id=189 op=LOAD May 10 03:35:48.099000 audit[4018]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002a9e68 items=0 ppid=3471 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462386239656538383965323664353835666561333239653333366131 May 10 03:35:48.131526 env[1150]: time="2025-05-10T03:35:48.131489321Z" level=info msg="StartContainer for \"db8b9ee889e26d585fea329e336a1bfd6d34e7f22dfdf0b536936f86a2a6d584\" returns successfully" May 10 03:35:48.339133 kubelet[2031]: I0510 03:35:48.339071 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7899b5db6d-kf5bg" podStartSLOduration=31.19839366 podStartE2EDuration="38.339054192s" podCreationTimestamp="2025-05-10 03:35:10 +0000 UTC" firstStartedPulling="2025-05-10 03:35:40.376193106 +0000 UTC m=+51.503488397" lastFinishedPulling="2025-05-10 03:35:47.516853588 +0000 UTC m=+58.644148929" observedRunningTime="2025-05-10 03:35:48.317317225 +0000 UTC m=+59.444612526" watchObservedRunningTime="2025-05-10 03:35:48.339054192 +0000 UTC m=+59.466349483" May 10 03:35:48.350000 audit[4049]: NETFILTER_CFG table=filter:108 family=2 entries=10 op=nft_register_rule pid=4049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:48.350000 audit[4049]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcb9c8b740 a2=0 a3=7ffcb9c8b72c items=0 ppid=2165 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.350000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:48.355000 audit[4049]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=4049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:48.355000 audit[4049]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb9c8b740 a2=0 a3=7ffcb9c8b72c items=0 ppid=2165 pid=4049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.355000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:48.377000 audit[4051]: NETFILTER_CFG table=filter:110 family=2 entries=10 op=nft_register_rule pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:48.377000 audit[4051]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc85ebf710 a2=0 a3=7ffc85ebf6fc items=0 ppid=2165 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:48.382000 audit[4051]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=4051 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:48.382000 audit[4051]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc85ebf710 a2=0 a3=7ffc85ebf6fc items=0 ppid=2165 pid=4051 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:48.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:48.895000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1110980241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c400 tclass=file permissive=0 May 10 03:35:48.895000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000378f80 a2=fc6 a3=0 items=0 ppid=3255 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 key=(null) May 10 03:35:48.895000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:35:48.980176 env[1150]: time="2025-05-10T03:35:48.980144440Z" level=info msg="StopPodSandbox for \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\"" May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.097 [WARNING][4065] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0", GenerateName:"calico-apiserver-7899b5db6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"38cb6e2c-c2a0-409b-9230-a9cc8785c2cf", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7899b5db6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df", Pod:"calico-apiserver-7899b5db6d-v9nrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f0ab95fd9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.097 [INFO][4065] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.097 [INFO][4065] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" iface="eth0" netns="" May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.097 [INFO][4065] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.097 [INFO][4065] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.138 [INFO][4074] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.138 [INFO][4074] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.139 [INFO][4074] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.145 [WARNING][4074] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.145 [INFO][4074] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.147 [INFO][4074] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.149465 env[1150]: 2025-05-10 03:35:49.148 [INFO][4065] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:49.150037 env[1150]: time="2025-05-10T03:35:49.149997613Z" level=info msg="TearDown network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\" successfully" May 10 03:35:49.150123 env[1150]: time="2025-05-10T03:35:49.150104084Z" level=info msg="StopPodSandbox for \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\" returns successfully" May 10 03:35:49.154872 env[1150]: time="2025-05-10T03:35:49.153729463Z" level=info msg="RemovePodSandbox for \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\"" May 10 03:35:49.154872 env[1150]: time="2025-05-10T03:35:49.153769107Z" level=info msg="Forcibly stopping sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\"" May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.192 [WARNING][4093] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0", GenerateName:"calico-apiserver-7899b5db6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"38cb6e2c-c2a0-409b-9230-a9cc8785c2cf", ResourceVersion:"824", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7899b5db6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"2694be48b9d6fa1bf112adbd3711a6c8636f452f7041e31f3a634aaea50645df", Pod:"calico-apiserver-7899b5db6d-v9nrp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5f0ab95fd9e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.192 [INFO][4093] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.192 [INFO][4093] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" iface="eth0" netns="" May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.192 [INFO][4093] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.192 [INFO][4093] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.221 [INFO][4101] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.221 [INFO][4101] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.221 [INFO][4101] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.233 [WARNING][4101] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.233 [INFO][4101] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" HandleID="k8s-pod-network.bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--v9nrp-eth0" May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.236 [INFO][4101] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.238916 env[1150]: 2025-05-10 03:35:49.237 [INFO][4093] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30" May 10 03:35:49.239477 env[1150]: time="2025-05-10T03:35:49.239446286Z" level=info msg="TearDown network for sandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\" successfully" May 10 03:35:49.250097 env[1150]: time="2025-05-10T03:35:49.250066409Z" level=info msg="RemovePodSandbox \"bdcf7bbff65df3513b2f861316d7ba80eb73cf0986885d6b986f27a8ef111f30\" returns successfully" May 10 03:35:49.250912 env[1150]: time="2025-05-10T03:35:49.250890661Z" level=info msg="StopPodSandbox for \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\"" May 10 03:35:49.305573 kubelet[2031]: I0510 03:35:49.305533 2031 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 03:35:49.306202 kubelet[2031]: I0510 03:35:49.306184 2031 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 03:35:49.336000 audit[4029]: AVC avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:35:49.336000 audit[4029]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e8ad60 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:35:49.336000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.320 [WARNING][4121] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f901b9fc-1fd8-4d58-b6a2-96852a615b4b", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879", Pod:"csi-node-driver-xkbzj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3c900c8033f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.320 [INFO][4121] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.320 [INFO][4121] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" iface="eth0" netns="" May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.320 [INFO][4121] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.320 [INFO][4121] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.351 [INFO][4128] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.351 [INFO][4128] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.352 [INFO][4128] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.358 [WARNING][4128] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.358 [INFO][4128] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.360 [INFO][4128] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.362756 env[1150]: 2025-05-10 03:35:49.361 [INFO][4121] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:49.363244 env[1150]: time="2025-05-10T03:35:49.362784500Z" level=info msg="TearDown network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\" successfully" May 10 03:35:49.363244 env[1150]: time="2025-05-10T03:35:49.362815609Z" level=info msg="StopPodSandbox for \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\" returns successfully" May 10 03:35:49.363637 env[1150]: time="2025-05-10T03:35:49.363613090Z" level=info msg="RemovePodSandbox for \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\"" May 10 03:35:49.363758 env[1150]: time="2025-05-10T03:35:49.363717467Z" level=info msg="Forcibly stopping sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\"" May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.406 [WARNING][4146] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f901b9fc-1fd8-4d58-b6a2-96852a615b4b", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879", Pod:"csi-node-driver-xkbzj", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.125.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali3c900c8033f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.407 [INFO][4146] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.407 [INFO][4146] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" iface="eth0" netns="" May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.407 [INFO][4146] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.407 [INFO][4146] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.431 [INFO][4153] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.431 [INFO][4153] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.431 [INFO][4153] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.437 [WARNING][4153] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.437 [INFO][4153] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" HandleID="k8s-pod-network.47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-csi--node--driver--xkbzj-eth0" May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.439 [INFO][4153] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.443239 env[1150]: 2025-05-10 03:35:49.440 [INFO][4146] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706" May 10 03:35:49.443239 env[1150]: time="2025-05-10T03:35:49.442015998Z" level=info msg="TearDown network for sandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\" successfully" May 10 03:35:49.453097 env[1150]: time="2025-05-10T03:35:49.453062154Z" level=info msg="RemovePodSandbox \"47aa6182329e36358dc84edeeee4cfa1f3a5df218c932394288669deed65d706\" returns successfully" May 10 03:35:49.453591 env[1150]: time="2025-05-10T03:35:49.453559991Z" level=info msg="StopPodSandbox for \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\"" May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.499 [WARNING][4173] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"07b0d8c4-503a-4abd-8662-ad72b8771bda", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5", Pod:"coredns-7db6d8ff4d-fhwvv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali77a6d907699", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.500 [INFO][4173] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.500 [INFO][4173] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" iface="eth0" netns="" May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.500 [INFO][4173] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.500 [INFO][4173] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.547 [INFO][4180] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.548 [INFO][4180] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.548 [INFO][4180] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.554 [WARNING][4180] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.554 [INFO][4180] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.556 [INFO][4180] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.559207 env[1150]: 2025-05-10 03:35:49.558 [INFO][4173] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:49.559775 env[1150]: time="2025-05-10T03:35:49.559201143Z" level=info msg="TearDown network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\" successfully" May 10 03:35:49.559775 env[1150]: time="2025-05-10T03:35:49.559230558Z" level=info msg="StopPodSandbox for \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\" returns successfully" May 10 03:35:49.560266 env[1150]: time="2025-05-10T03:35:49.560241793Z" level=info msg="RemovePodSandbox for \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\"" May 10 03:35:49.560352 env[1150]: time="2025-05-10T03:35:49.560291336Z" level=info msg="Forcibly stopping sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\"" May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.599 [WARNING][4199] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"07b0d8c4-503a-4abd-8662-ad72b8771bda", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"ad584d5967df2f1ed4974a7f4e58686c5c65715bdfbbf67b988ccd198fd866a5", Pod:"coredns-7db6d8ff4d-fhwvv", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali77a6d907699", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.599 [INFO][4199] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.599 [INFO][4199] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" iface="eth0" netns="" May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.599 [INFO][4199] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.599 [INFO][4199] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.622 [INFO][4206] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.623 [INFO][4206] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.623 [INFO][4206] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.629 [WARNING][4206] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.629 [INFO][4206] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" HandleID="k8s-pod-network.45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--fhwvv-eth0" May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.631 [INFO][4206] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.633359 env[1150]: 2025-05-10 03:35:49.632 [INFO][4199] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082" May 10 03:35:49.633839 env[1150]: time="2025-05-10T03:35:49.633378250Z" level=info msg="TearDown network for sandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\" successfully" May 10 03:35:49.637550 env[1150]: time="2025-05-10T03:35:49.637520371Z" level=info msg="RemovePodSandbox \"45f76c4710e9d0673dd53adef3067aeb4fdc98ade6a8f1eee9a02bae32312082\" returns successfully" May 10 03:35:49.638007 env[1150]: time="2025-05-10T03:35:49.637983143Z" level=info msg="StopPodSandbox for \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\"" May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.687 [WARNING][4225] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0", GenerateName:"calico-apiserver-7899b5db6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1fb9b91-17d3-445c-8a9b-1b2aeb70a534", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7899b5db6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea", Pod:"calico-apiserver-7899b5db6d-kf5bg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibcaa7d44340", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.687 [INFO][4225] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.687 [INFO][4225] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" iface="eth0" netns="" May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.687 [INFO][4225] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.687 [INFO][4225] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.716 [INFO][4232] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.717 [INFO][4232] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.717 [INFO][4232] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.723 [WARNING][4232] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.723 [INFO][4232] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.725 [INFO][4232] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.728537 env[1150]: 2025-05-10 03:35:49.725 [INFO][4225] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:49.728537 env[1150]: time="2025-05-10T03:35:49.727023747Z" level=info msg="TearDown network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\" successfully" May 10 03:35:49.728537 env[1150]: time="2025-05-10T03:35:49.727053272Z" level=info msg="StopPodSandbox for \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\" returns successfully" May 10 03:35:49.729581 env[1150]: time="2025-05-10T03:35:49.729542732Z" level=info msg="RemovePodSandbox for \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\"" May 10 03:35:49.729637 env[1150]: time="2025-05-10T03:35:49.729572518Z" level=info msg="Forcibly stopping sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\"" May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.792 [WARNING][4252] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0", GenerateName:"calico-apiserver-7899b5db6d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e1fb9b91-17d3-445c-8a9b-1b2aeb70a534", ResourceVersion:"820", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7899b5db6d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"870dd477f5051d8154147112791aa422fc0814e4b59f5fab50417aab89d600ea", Pod:"calico-apiserver-7899b5db6d-kf5bg", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.125.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibcaa7d44340", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.792 [INFO][4252] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.792 [INFO][4252] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" iface="eth0" netns="" May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.792 [INFO][4252] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.792 [INFO][4252] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.832 [INFO][4259] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.832 [INFO][4259] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.832 [INFO][4259] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.839 [WARNING][4259] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.839 [INFO][4259] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" HandleID="k8s-pod-network.434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--apiserver--7899b5db6d--kf5bg-eth0" May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.841 [INFO][4259] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.843566 env[1150]: 2025-05-10 03:35:49.842 [INFO][4252] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438" May 10 03:35:49.844063 env[1150]: time="2025-05-10T03:35:49.843589255Z" level=info msg="TearDown network for sandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\" successfully" May 10 03:35:49.847895 env[1150]: time="2025-05-10T03:35:49.847867213Z" level=info msg="RemovePodSandbox \"434dfc79c3c5fd6a8b1b70dcd5a4cb74f63dcdeb6346a32ab034711f89c2a438\" returns successfully" May 10 03:35:49.848638 env[1150]: time="2025-05-10T03:35:49.848614640Z" level=info msg="StopPodSandbox for \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\"" May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.896 [WARNING][4278] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0", GenerateName:"calico-kube-controllers-765b4476b7-", Namespace:"calico-system", SelfLink:"", UID:"cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"765b4476b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6", Pod:"calico-kube-controllers-765b4476b7-smp42", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali052d349ff17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.896 [INFO][4278] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.896 [INFO][4278] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" iface="eth0" netns="" May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.896 [INFO][4278] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.896 [INFO][4278] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.926 [INFO][4287] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.926 [INFO][4287] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.926 [INFO][4287] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.937 [WARNING][4287] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.937 [INFO][4287] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.940 [INFO][4287] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:49.942730 env[1150]: 2025-05-10 03:35:49.941 [INFO][4278] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:49.943378 env[1150]: time="2025-05-10T03:35:49.943349880Z" level=info msg="TearDown network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\" successfully" May 10 03:35:49.943509 env[1150]: time="2025-05-10T03:35:49.943456391Z" level=info msg="StopPodSandbox for \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\" returns successfully" May 10 03:35:49.944072 env[1150]: time="2025-05-10T03:35:49.944051101Z" level=info msg="RemovePodSandbox for \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\"" May 10 03:35:49.944184 env[1150]: time="2025-05-10T03:35:49.944146942Z" level=info msg="Forcibly stopping sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\"" May 10 03:35:50.006353 env[1150]: time="2025-05-10T03:35:50.004463751Z" level=info msg="StopPodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\"" May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:49.987 [WARNING][4306] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0", GenerateName:"calico-kube-controllers-765b4476b7-", Namespace:"calico-system", SelfLink:"", UID:"cc6a7cf7-cac6-46cf-9ad6-23c579cfc8f7", ResourceVersion:"779", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"765b4476b7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6", Pod:"calico-kube-controllers-765b4476b7-smp42", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.125.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali052d349ff17", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:49.987 [INFO][4306] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:49.987 [INFO][4306] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" iface="eth0" netns="" May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:49.987 [INFO][4306] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:49.987 [INFO][4306] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:50.027 [INFO][4313] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:50.027 [INFO][4313] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:50.027 [INFO][4313] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:50.035 [WARNING][4313] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:50.035 [INFO][4313] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" HandleID="k8s-pod-network.6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-calico--kube--controllers--765b4476b7--smp42-eth0" May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:50.036 [INFO][4313] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:50.039429 env[1150]: 2025-05-10 03:35:50.038 [INFO][4306] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45" May 10 03:35:50.040513 env[1150]: time="2025-05-10T03:35:50.040484181Z" level=info msg="TearDown network for sandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\" successfully" May 10 03:35:50.044815 env[1150]: time="2025-05-10T03:35:50.044768089Z" level=info msg="RemovePodSandbox \"6469fce4b0b8dc63ba632e7390d497bb5f4ed78f7ea0ffec9694becbad54df45\" returns successfully" May 10 03:35:50.093258 kubelet[2031]: I0510 03:35:50.092655 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7899b5db6d-v9nrp" podStartSLOduration=33.70017768 podStartE2EDuration="40.092631173s" podCreationTimestamp="2025-05-10 03:35:10 +0000 UTC" firstStartedPulling="2025-05-10 03:35:41.623101456 +0000 UTC m=+52.750396747" lastFinishedPulling="2025-05-10 03:35:48.015554949 +0000 UTC m=+59.142850240" observedRunningTime="2025-05-10 03:35:48.341039371 +0000 UTC m=+59.468334673" watchObservedRunningTime="2025-05-10 03:35:50.092631173 +0000 UTC m=+61.219926474" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.090 [INFO][4334] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.091 [INFO][4334] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" iface="eth0" netns="/var/run/netns/cni-4947e184-31f1-21b1-19f1-73e835c1c930" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.091 [INFO][4334] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" iface="eth0" netns="/var/run/netns/cni-4947e184-31f1-21b1-19f1-73e835c1c930" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.091 [INFO][4334] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" iface="eth0" netns="/var/run/netns/cni-4947e184-31f1-21b1-19f1-73e835c1c930" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.091 [INFO][4334] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.091 [INFO][4334] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.130 [INFO][4341] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.130 [INFO][4341] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.131 [INFO][4341] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.137 [WARNING][4341] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.137 [INFO][4341] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.139 [INFO][4341] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:50.142525 env[1150]: 2025-05-10 03:35:50.141 [INFO][4334] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:35:50.149453 env[1150]: time="2025-05-10T03:35:50.147504800Z" level=info msg="TearDown network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\" successfully" May 10 03:35:50.149453 env[1150]: time="2025-05-10T03:35:50.147544194Z" level=info msg="StopPodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\" returns successfully" May 10 03:35:50.148084 systemd[1]: run-netns-cni\x2d4947e184\x2d31f1\x2d21b1\x2d19f1\x2d73e835c1c930.mount: Deactivated successfully. May 10 03:35:50.150523 env[1150]: time="2025-05-10T03:35:50.150490033Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v6mlw,Uid:bbb57afd-a29e-4b88-a48a-441691cf9617,Namespace:kube-system,Attempt:1,}" May 10 03:35:50.266399 kernel: kauditd_printk_skb: 335 callbacks suppressed May 10 03:35:50.267537 kernel: audit: type=1400 audit(1746848150.258:1281): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:50.267609 kernel: audit: type=1300 audit(1746848150.258:1281): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002876ee0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:50.258000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:50.258000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002876ee0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:50.258000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:50.265000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:50.288501 kernel: audit: type=1327 audit(1746848150.258:1281): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:50.288566 kernel: audit: type=1400 audit(1746848150.265:1282): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:50.265000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002876f00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:50.296290 kernel: audit: type=1300 audit(1746848150.265:1282): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002876f00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:50.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:50.302746 kernel: audit: type=1327 audit(1746848150.265:1282): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:50.265000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:50.308788 kernel: audit: type=1400 audit(1746848150.265:1283): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:50.265000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001216c00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:50.318350 kernel: audit: type=1300 audit(1746848150.265:1283): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001216c00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:50.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:50.265000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:50.332855 kernel: audit: type=1327 audit(1746848150.265:1283): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:50.332949 kernel: audit: type=1400 audit(1746848150.265:1284): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:35:50.265000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002876f20 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:35:50.265000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:35:50.377347 systemd-networkd[991]: cali17af01da7ee: Link UP May 10 03:35:50.382282 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 10 03:35:50.382353 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali17af01da7ee: link becomes ready May 10 03:35:50.383056 systemd-networkd[991]: cali17af01da7ee: Gained carrier May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.212 [INFO][4347] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0 coredns-7db6d8ff4d- kube-system bbb57afd-a29e-4b88-a48a-441691cf9617 829 0 2025-05-10 03:35:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510-3-7-n-13802d7031.novalocal coredns-7db6d8ff4d-v6mlw eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali17af01da7ee [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6mlw" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.212 [INFO][4347] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6mlw" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.309 [INFO][4359] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" HandleID="k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.338 [INFO][4359] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" HandleID="k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000313d30), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510-3-7-n-13802d7031.novalocal", "pod":"coredns-7db6d8ff4d-v6mlw", "timestamp":"2025-05-10 03:35:50.309890874 +0000 UTC"}, Hostname:"ci-3510-3-7-n-13802d7031.novalocal", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.339 [INFO][4359] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.339 [INFO][4359] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.339 [INFO][4359] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510-3-7-n-13802d7031.novalocal' May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.341 [INFO][4359] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.345 [INFO][4359] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.350 [INFO][4359] ipam/ipam.go 489: Trying affinity for 192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.352 [INFO][4359] ipam/ipam.go 155: Attempting to load block cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.354 [INFO][4359] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.125.64/26 host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.354 [INFO][4359] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.125.64/26 handle="k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.356 [INFO][4359] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673 May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.360 [INFO][4359] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.125.64/26 handle="k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.372 [INFO][4359] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.125.70/26] block=192.168.125.64/26 handle="k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.372 [INFO][4359] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.125.70/26] handle="k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" host="ci-3510-3-7-n-13802d7031.novalocal" May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.372 [INFO][4359] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:35:50.399693 env[1150]: 2025-05-10 03:35:50.372 [INFO][4359] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.125.70/26] IPv6=[] ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" HandleID="k8s-pod-network.5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.400749 env[1150]: 2025-05-10 03:35:50.373 [INFO][4347] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6mlw" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bbb57afd-a29e-4b88-a48a-441691cf9617", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"", Pod:"coredns-7db6d8ff4d-v6mlw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali17af01da7ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:50.400749 env[1150]: 2025-05-10 03:35:50.373 [INFO][4347] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.125.70/32] ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6mlw" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.400749 env[1150]: 2025-05-10 03:35:50.373 [INFO][4347] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali17af01da7ee ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6mlw" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.400749 env[1150]: 2025-05-10 03:35:50.383 [INFO][4347] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6mlw" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.400749 env[1150]: 2025-05-10 03:35:50.384 [INFO][4347] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6mlw" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bbb57afd-a29e-4b88-a48a-441691cf9617", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673", Pod:"coredns-7db6d8ff4d-v6mlw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali17af01da7ee", MAC:"4a:26:cf:9a:3b:70", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:35:50.400749 env[1150]: 2025-05-10 03:35:50.396 [INFO][4347] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673" Namespace="kube-system" Pod="coredns-7db6d8ff4d-v6mlw" WorkloadEndpoint="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:35:50.418000 audit[4381]: NETFILTER_CFG table=filter:112 family=2 entries=46 op=nft_register_chain pid=4381 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 10 03:35:50.418000 audit[4381]: SYSCALL arch=c000003e syscall=46 success=yes exit=21784 a0=3 a1=7fffe20c5e00 a2=0 a3=7fffe20c5dec items=0 ppid=3331 pid=4381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.418000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 10 03:35:50.424185 env[1150]: time="2025-05-10T03:35:50.424106293Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 10 03:35:50.424486 env[1150]: time="2025-05-10T03:35:50.424416968Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 10 03:35:50.424486 env[1150]: time="2025-05-10T03:35:50.424455852Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 10 03:35:50.424799 env[1150]: time="2025-05-10T03:35:50.424742742Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673 pid=4388 runtime=io.containerd.runc.v2 May 10 03:35:50.446600 systemd[1]: Started cri-containerd-5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673.scope. May 10 03:35:50.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.470000 audit: BPF prog-id=190 op=LOAD May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4388 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376562646137343261353865643138326239623962353132643332 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4388 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376562646137343261353865643138326239623962353132643332 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit: BPF prog-id=191 op=LOAD May 10 03:35:50.471000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024ca0 items=0 ppid=4388 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376562646137343261353865643138326239623962353132643332 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.471000 audit: BPF prog-id=192 op=LOAD May 10 03:35:50.471000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000024ce8 items=0 ppid=4388 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376562646137343261353865643138326239623962353132643332 May 10 03:35:50.472000 audit: BPF prog-id=192 op=UNLOAD May 10 03:35:50.472000 audit: BPF prog-id=191 op=UNLOAD May 10 03:35:50.472000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { perfmon } for pid=4397 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit[4397]: AVC avc: denied { bpf } for pid=4397 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.472000 audit: BPF prog-id=193 op=LOAD May 10 03:35:50.472000 audit[4397]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000250f8 items=0 ppid=4388 pid=4397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565376562646137343261353865643138326239623962353132643332 May 10 03:35:50.511184 env[1150]: time="2025-05-10T03:35:50.511142194Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-v6mlw,Uid:bbb57afd-a29e-4b88-a48a-441691cf9617,Namespace:kube-system,Attempt:1,} returns sandbox id \"5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673\"" May 10 03:35:50.515421 env[1150]: time="2025-05-10T03:35:50.515377551Z" level=info msg="CreateContainer within sandbox \"5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 10 03:35:50.535968 env[1150]: time="2025-05-10T03:35:50.535887268Z" level=info msg="CreateContainer within sandbox \"5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"69d27117cdf5699587ce2ed530e4a1fc1994607ad38b5eba6b834de129fbf745\"" May 10 03:35:50.538232 env[1150]: time="2025-05-10T03:35:50.538162773Z" level=info msg="StartContainer for \"69d27117cdf5699587ce2ed530e4a1fc1994607ad38b5eba6b834de129fbf745\"" May 10 03:35:50.566216 systemd[1]: Started cri-containerd-69d27117cdf5699587ce2ed530e4a1fc1994607ad38b5eba6b834de129fbf745.scope. May 10 03:35:50.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.583000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.583000 audit: BPF prog-id=194 op=LOAD May 10 03:35:50.584000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4388 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643237313137636466353639393538376365326564353330653461 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=4388 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643237313137636466353639393538376365326564353330653461 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.584000 audit: BPF prog-id=195 op=LOAD May 10 03:35:50.584000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000293440 items=0 ppid=4388 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643237313137636466353639393538376365326564353330653461 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.585000 audit: BPF prog-id=196 op=LOAD May 10 03:35:50.585000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000293488 items=0 ppid=4388 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.585000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643237313137636466353639393538376365326564353330653461 May 10 03:35:50.585000 audit: BPF prog-id=196 op=UNLOAD May 10 03:35:50.585000 audit: BPF prog-id=195 op=UNLOAD May 10 03:35:50.586000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { perfmon } for pid=4431 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit[4431]: AVC avc: denied { bpf } for pid=4431 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:50.586000 audit: BPF prog-id=197 op=LOAD May 10 03:35:50.586000 audit[4431]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000293898 items=0 ppid=4388 pid=4431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:50.586000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639643237313137636466353639393538376365326564353330653461 May 10 03:35:50.605862 env[1150]: time="2025-05-10T03:35:50.605823554Z" level=info msg="StartContainer for \"69d27117cdf5699587ce2ed530e4a1fc1994607ad38b5eba6b834de129fbf745\" returns successfully" May 10 03:35:51.332575 kubelet[2031]: I0510 03:35:51.332516 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-v6mlw" podStartSLOduration=48.332498992 podStartE2EDuration="48.332498992s" podCreationTimestamp="2025-05-10 03:35:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-10 03:35:51.330930298 +0000 UTC m=+62.458225589" watchObservedRunningTime="2025-05-10 03:35:51.332498992 +0000 UTC m=+62.459794293" May 10 03:35:51.380000 audit[4460]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:51.380000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff36f075d0 a2=0 a3=7fff36f075bc items=0 ppid=2165 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:51.380000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:51.385000 audit[4460]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4460 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:51.385000 audit[4460]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff36f075d0 a2=0 a3=7fff36f075bc items=0 ppid=2165 pid=4460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:51.385000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:51.401000 audit[4462]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:51.401000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff3ddd8ac0 a2=0 a3=7fff3ddd8aac items=0 ppid=2165 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:51.401000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:51.417000 audit[4462]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:51.417000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7fff3ddd8ac0 a2=0 a3=7fff3ddd8aac items=0 ppid=2165 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:51.417000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:52.269833 systemd-networkd[991]: cali17af01da7ee: Gained IPv6LL May 10 03:35:52.286025 env[1150]: time="2025-05-10T03:35:52.285944536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:52.294658 env[1150]: time="2025-05-10T03:35:52.294325748Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:52.298998 env[1150]: time="2025-05-10T03:35:52.296700559Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:52.302090 env[1150]: time="2025-05-10T03:35:52.301179964Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:52.302907 env[1150]: time="2025-05-10T03:35:52.302839680Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 10 03:35:52.319202 env[1150]: time="2025-05-10T03:35:52.319171412Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 10 03:35:52.333993 env[1150]: time="2025-05-10T03:35:52.333949119Z" level=info msg="CreateContainer within sandbox \"0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 10 03:35:52.353378 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3687217574.mount: Deactivated successfully. May 10 03:35:52.360873 env[1150]: time="2025-05-10T03:35:52.360832010Z" level=info msg="CreateContainer within sandbox \"0cb899d175a364c4ffc37b87fcb819f61baf389b3c076f655c2af3509b310fa6\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c\"" May 10 03:35:52.361654 env[1150]: time="2025-05-10T03:35:52.361626776Z" level=info msg="StartContainer for \"bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c\"" May 10 03:35:52.386207 systemd[1]: Started cri-containerd-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c.scope. May 10 03:35:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.404000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.405000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.405000 audit: BPF prog-id=198 op=LOAD May 10 03:35:52.405000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.405000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3683 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:52.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376535326436336461643435366433313165653839333966373936 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3683 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:52.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376535326436336461643435366433313165653839333966373936 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit: BPF prog-id=199 op=LOAD May 10 03:35:52.406000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c00038c370 items=0 ppid=3683 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:52.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376535326436336461643435366433313165653839333966373936 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit: BPF prog-id=200 op=LOAD May 10 03:35:52.406000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c00038c3b8 items=0 ppid=3683 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:52.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376535326436336461643435366433313165653839333966373936 May 10 03:35:52.406000 audit: BPF prog-id=200 op=UNLOAD May 10 03:35:52.406000 audit: BPF prog-id=199 op=UNLOAD May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { perfmon } for pid=4480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit[4480]: AVC avc: denied { bpf } for pid=4480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:52.406000 audit: BPF prog-id=201 op=LOAD May 10 03:35:52.406000 audit[4480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c00038c7c8 items=0 ppid=3683 pid=4480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:52.406000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6262376535326436336461643435366433313165653839333966373936 May 10 03:35:52.443142 env[1150]: time="2025-05-10T03:35:52.442440429Z" level=info msg="StartContainer for \"bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c\" returns successfully" May 10 03:35:53.366222 kubelet[2031]: I0510 03:35:53.365970 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-765b4476b7-smp42" podStartSLOduration=33.554990188 podStartE2EDuration="42.365774901s" podCreationTimestamp="2025-05-10 03:35:11 +0000 UTC" firstStartedPulling="2025-05-10 03:35:43.495255704 +0000 UTC m=+54.622550995" lastFinishedPulling="2025-05-10 03:35:52.306040417 +0000 UTC m=+63.433335708" observedRunningTime="2025-05-10 03:35:53.364005079 +0000 UTC m=+64.491300410" watchObservedRunningTime="2025-05-10 03:35:53.365774901 +0000 UTC m=+64.493070242" May 10 03:35:53.397586 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.mdpJFs.mount: Deactivated successfully. May 10 03:35:53.902245 kubelet[2031]: I0510 03:35:53.902198 2031 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 03:35:53.997000 audit[4527]: NETFILTER_CFG table=filter:117 family=2 entries=9 op=nft_register_rule pid=4527 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:53.997000 audit[4527]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc5f721cf0 a2=0 a3=7ffc5f721cdc items=0 ppid=2165 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:53.997000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:54.001000 audit[4527]: NETFILTER_CFG table=nat:118 family=2 entries=27 op=nft_register_chain pid=4527 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:35:54.001000 audit[4527]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc5f721cf0 a2=0 a3=7ffc5f721cdc items=0 ppid=2165 pid=4527 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:54.001000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:35:54.488548 env[1150]: time="2025-05-10T03:35:54.488467363Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:54.490870 env[1150]: time="2025-05-10T03:35:54.490817438Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:54.492979 env[1150]: time="2025-05-10T03:35:54.492929053Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:54.495211 env[1150]: time="2025-05-10T03:35:54.495156747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:54.495765 env[1150]: time="2025-05-10T03:35:54.495717152Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 10 03:35:54.501822 env[1150]: time="2025-05-10T03:35:54.499396960Z" level=info msg="CreateContainer within sandbox \"321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 10 03:35:54.533077 env[1150]: time="2025-05-10T03:35:54.532987670Z" level=info msg="CreateContainer within sandbox \"321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"9123610ca90a655e2fc4a8749d5c84d2c8b8bdb6359a3774733302c8208721f8\"" May 10 03:35:54.535357 env[1150]: time="2025-05-10T03:35:54.535313479Z" level=info msg="StartContainer for \"9123610ca90a655e2fc4a8749d5c84d2c8b8bdb6359a3774733302c8208721f8\"" May 10 03:35:54.538664 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1968340315.mount: Deactivated successfully. May 10 03:35:54.576609 systemd[1]: run-containerd-runc-k8s.io-9123610ca90a655e2fc4a8749d5c84d2c8b8bdb6359a3774733302c8208721f8-runc.ua6UAN.mount: Deactivated successfully. May 10 03:35:54.584665 systemd[1]: Started cri-containerd-9123610ca90a655e2fc4a8749d5c84d2c8b8bdb6359a3774733302c8208721f8.scope. May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f91746fb048 items=0 ppid=3882 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:54.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323336313063613930613635356532666334613837343964356338 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit: BPF prog-id=202 op=LOAD May 10 03:35:54.600000 audit[4536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0003d2518 items=0 ppid=3882 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:54.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323336313063613930613635356532666334613837343964356338 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit: BPF prog-id=203 op=LOAD May 10 03:35:54.600000 audit[4536]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0003d2568 items=0 ppid=3882 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:54.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323336313063613930613635356532666334613837343964356338 May 10 03:35:54.600000 audit: BPF prog-id=203 op=UNLOAD May 10 03:35:54.600000 audit: BPF prog-id=202 op=UNLOAD May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { perfmon } for pid=4536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit[4536]: AVC avc: denied { bpf } for pid=4536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:54.600000 audit: BPF prog-id=204 op=LOAD May 10 03:35:54.600000 audit[4536]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003d25f8 items=0 ppid=3882 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:54.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3931323336313063613930613635356532666334613837343964356338 May 10 03:35:54.620809 env[1150]: time="2025-05-10T03:35:54.620762340Z" level=info msg="StartContainer for \"9123610ca90a655e2fc4a8749d5c84d2c8b8bdb6359a3774733302c8208721f8\" returns successfully" May 10 03:35:54.622001 env[1150]: time="2025-05-10T03:35:54.621734561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 10 03:35:57.626048 env[1150]: time="2025-05-10T03:35:57.626002469Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:57.628795 env[1150]: time="2025-05-10T03:35:57.628750530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:57.630991 env[1150]: time="2025-05-10T03:35:57.630961061Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:57.633352 env[1150]: time="2025-05-10T03:35:57.633323087Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 10 03:35:57.635653 env[1150]: time="2025-05-10T03:35:57.635627776Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 10 03:35:57.639010 env[1150]: time="2025-05-10T03:35:57.638931844Z" level=info msg="CreateContainer within sandbox \"321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 10 03:35:57.669036 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1915461638.mount: Deactivated successfully. May 10 03:35:57.681581 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.YBfGwZ.mount: Deactivated successfully. May 10 03:35:57.684460 env[1150]: time="2025-05-10T03:35:57.684403270Z" level=info msg="CreateContainer within sandbox \"321b1b16c2e86045fbb20e09ab1a4b0a689044cdcca240ad2edcc955ab958879\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"023909c7d6505af148f4949d3d7f64683cf457e5da91fe8e6ba2417befc2901a\"" May 10 03:35:57.685257 env[1150]: time="2025-05-10T03:35:57.685228493Z" level=info msg="StartContainer for \"023909c7d6505af148f4949d3d7f64683cf457e5da91fe8e6ba2417befc2901a\"" May 10 03:35:57.716856 systemd[1]: Started cri-containerd-023909c7d6505af148f4949d3d7f64683cf457e5da91fe8e6ba2417befc2901a.scope. May 10 03:35:57.759165 kernel: kauditd_printk_skb: 237 callbacks suppressed May 10 03:35:57.759302 kernel: audit: type=1400 audit(1746848157.745:1352): avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.759335 kernel: audit: type=1300 audit(1746848157.745:1352): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f33a1c5e1b8 items=0 ppid=3882 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:57.745000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.745000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f33a1c5e1b8 items=0 ppid=3882 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:57.745000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032333930396337643635303561663134386634393439643364376636 May 10 03:35:57.771582 kernel: audit: type=1327 audit(1746848157.745:1352): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032333930396337643635303561663134386634393439643364376636 May 10 03:35:57.771650 kernel: audit: type=1400 audit(1746848157.746:1353): avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.777288 kernel: audit: type=1400 audit(1746848157.746:1353): avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.785288 kernel: audit: type=1400 audit(1746848157.746:1353): avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.790293 kernel: audit: type=1400 audit(1746848157.746:1353): avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.796413 kernel: audit: type=1400 audit(1746848157.746:1353): avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.806591 kernel: audit: type=1400 audit(1746848157.746:1353): avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.806685 kernel: audit: type=1400 audit(1746848157.746:1353): avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.746000 audit: BPF prog-id=205 op=LOAD May 10 03:35:57.746000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0001e45d8 items=0 ppid=3882 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:57.746000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032333930396337643635303561663134386634393439643364376636 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.751000 audit: BPF prog-id=206 op=LOAD May 10 03:35:57.751000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c0001e4628 items=0 ppid=3882 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:57.751000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032333930396337643635303561663134386634393439643364376636 May 10 03:35:57.766000 audit: BPF prog-id=206 op=UNLOAD May 10 03:35:57.766000 audit: BPF prog-id=205 op=UNLOAD May 10 03:35:57.766000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { perfmon } for pid=4608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit[4608]: AVC avc: denied { bpf } for pid=4608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 10 03:35:57.766000 audit: BPF prog-id=207 op=LOAD May 10 03:35:57.766000 audit[4608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0001e46b8 items=0 ppid=3882 pid=4608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:35:57.766000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032333930396337643635303561663134386634393439643364376636 May 10 03:35:58.109424 env[1150]: time="2025-05-10T03:35:58.109343494Z" level=info msg="StartContainer for \"023909c7d6505af148f4949d3d7f64683cf457e5da91fe8e6ba2417befc2901a\" returns successfully" May 10 03:35:58.111959 kubelet[2031]: I0510 03:35:58.111918 2031 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 10 03:35:58.112706 kubelet[2031]: I0510 03:35:58.112677 2031 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 10 03:35:58.375366 kubelet[2031]: I0510 03:35:58.375137 2031 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-xkbzj" podStartSLOduration=34.636703373 podStartE2EDuration="47.375106163s" podCreationTimestamp="2025-05-10 03:35:11 +0000 UTC" firstStartedPulling="2025-05-10 03:35:44.898318443 +0000 UTC m=+56.025613734" lastFinishedPulling="2025-05-10 03:35:57.636721233 +0000 UTC m=+68.764016524" observedRunningTime="2025-05-10 03:35:58.373648108 +0000 UTC m=+69.500943440" watchObservedRunningTime="2025-05-10 03:35:58.375106163 +0000 UTC m=+69.502401504" May 10 03:36:23.651078 kubelet[2031]: I0510 03:36:23.651021 2031 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 10 03:36:23.740000 audit[4669]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:36:23.745745 kernel: kauditd_printk_skb: 33 callbacks suppressed May 10 03:36:23.745803 kernel: audit: type=1325 audit(1746848183.740:1358): table=filter:119 family=2 entries=8 op=nft_register_rule pid=4669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:36:23.740000 audit[4669]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff9c2282f0 a2=0 a3=7fff9c2282dc items=0 ppid=2165 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:36:23.765294 kernel: audit: type=1300 audit(1746848183.740:1358): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff9c2282f0 a2=0 a3=7fff9c2282dc items=0 ppid=2165 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:36:23.740000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:36:23.768880 kernel: audit: type=1327 audit(1746848183.740:1358): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:36:23.768000 audit[4669]: NETFILTER_CFG table=nat:120 family=2 entries=34 op=nft_register_chain pid=4669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:36:23.768000 audit[4669]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff9c2282f0 a2=0 a3=7fff9c2282dc items=0 ppid=2165 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:36:23.780919 kernel: audit: type=1325 audit(1746848183.768:1359): table=nat:120 family=2 entries=34 op=nft_register_chain pid=4669 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:36:23.780966 kernel: audit: type=1300 audit(1746848183.768:1359): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff9c2282f0 a2=0 a3=7fff9c2282dc items=0 ppid=2165 pid=4669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:36:23.780996 kernel: audit: type=1327 audit(1746848183.768:1359): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:36:23.768000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:36:24.874359 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.5xQ2XL.mount: Deactivated successfully. May 10 03:36:27.693844 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.dPVmih.mount: Deactivated successfully. May 10 03:36:37.357254 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.xgrC1e.mount: Deactivated successfully. May 10 03:36:44.891000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:44.906356 kernel: audit: type=1400 audit(1746848204.891:1360): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:44.906498 kernel: audit: type=1400 audit(1746848204.891:1361): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:44.891000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:44.891000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a07050 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:44.939736 kernel: audit: type=1300 audit(1746848204.891:1361): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a07050 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:44.939879 kernel: audit: type=1327 audit(1746848204.891:1361): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:44.891000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:44.891000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0029eac20 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:44.973059 kernel: audit: type=1300 audit(1746848204.891:1360): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0029eac20 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:44.973176 kernel: audit: type=1327 audit(1746848204.891:1360): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:44.891000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:45.303000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:45.321398 kernel: audit: type=1400 audit(1746848205.303:1362): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:45.304000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:45.304000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b877100 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:36:45.357004 kernel: audit: type=1400 audit(1746848205.304:1363): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:45.357133 kernel: audit: type=1300 audit(1746848205.304:1363): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00b877100 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:36:45.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:36:45.303000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ad97b90 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:36:45.374706 kernel: audit: type=1327 audit(1746848205.304:1363): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:36:45.303000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:36:45.305000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:45.305000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00ad97bf0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:36:45.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:36:45.321000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:45.321000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00b670390 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:36:45.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:36:45.328000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:45.328000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00b670480 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:36:45.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:36:45.328000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:45.328000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00b877280 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:36:45.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:36:48.897000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1110980241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c400 tclass=file permissive=0 May 10 03:36:48.897000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000315700 a2=fc6 a3=0 items=0 ppid=3255 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 key=(null) May 10 03:36:48.897000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:36:49.339000 audit[4029]: AVC avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:36:49.339000 audit[4029]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f83ba0 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:36:49.339000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:36:50.051951 env[1150]: time="2025-05-10T03:36:50.051844556Z" level=info msg="StopPodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\"" May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.146 [WARNING][4751] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bbb57afd-a29e-4b88-a48a-441691cf9617", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673", Pod:"coredns-7db6d8ff4d-v6mlw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali17af01da7ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.146 [INFO][4751] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.146 [INFO][4751] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" iface="eth0" netns="" May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.146 [INFO][4751] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.146 [INFO][4751] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.200 [INFO][4758] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.200 [INFO][4758] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.200 [INFO][4758] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.212 [WARNING][4758] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.212 [INFO][4758] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.214 [INFO][4758] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:36:50.219058 env[1150]: 2025-05-10 03:36:50.216 [INFO][4751] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:36:50.219587 env[1150]: time="2025-05-10T03:36:50.219116912Z" level=info msg="TearDown network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\" successfully" May 10 03:36:50.219587 env[1150]: time="2025-05-10T03:36:50.219178137Z" level=info msg="StopPodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\" returns successfully" May 10 03:36:50.220223 env[1150]: time="2025-05-10T03:36:50.220162506Z" level=info msg="RemovePodSandbox for \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\"" May 10 03:36:50.220618 env[1150]: time="2025-05-10T03:36:50.220237898Z" level=info msg="Forcibly stopping sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\"" May 10 03:36:50.260000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:50.262886 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 03:36:50.262946 kernel: audit: type=1400 audit(1746848210.260:1370): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:50.260000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027db640 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:50.260000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:50.282021 kernel: audit: type=1300 audit(1746848210.260:1370): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027db640 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:50.282139 kernel: audit: type=1327 audit(1746848210.260:1370): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:50.282171 kernel: audit: type=1400 audit(1746848210.266:1371): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:50.266000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:50.266000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027db7e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:50.295124 kernel: audit: type=1300 audit(1746848210.266:1371): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027db7e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:50.295202 kernel: audit: type=1327 audit(1746848210.266:1371): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:50.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:50.266000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:50.307325 kernel: audit: type=1400 audit(1746848210.266:1372): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:50.307383 kernel: audit: type=1300 audit(1746848210.266:1372): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027db800 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:50.266000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0027db800 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:50.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:50.321325 kernel: audit: type=1327 audit(1746848210.266:1372): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:50.321421 kernel: audit: type=1400 audit(1746848210.266:1373): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:50.266000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:36:50.266000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0029eaee0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:36:50.266000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.263 [WARNING][4780] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"bbb57afd-a29e-4b88-a48a-441691cf9617", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2025, time.May, 10, 3, 35, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510-3-7-n-13802d7031.novalocal", ContainerID:"5e7ebda742a58ed182b9b9b512d3237d34a7c80c84f3809bef476e4c4e213673", Pod:"coredns-7db6d8ff4d-v6mlw", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.125.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali17af01da7ee", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.263 [INFO][4780] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.263 [INFO][4780] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" iface="eth0" netns="" May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.263 [INFO][4780] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.263 [INFO][4780] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.334 [INFO][4787] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.334 [INFO][4787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.334 [INFO][4787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.340 [WARNING][4787] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.340 [INFO][4787] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" HandleID="k8s-pod-network.a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" Workload="ci--3510--3--7--n--13802d7031.novalocal-k8s-coredns--7db6d8ff4d--v6mlw-eth0" May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.342 [INFO][4787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 10 03:36:50.344368 env[1150]: 2025-05-10 03:36:50.343 [INFO][4780] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed" May 10 03:36:50.344897 env[1150]: time="2025-05-10T03:36:50.344866314Z" level=info msg="TearDown network for sandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\" successfully" May 10 03:36:50.354641 env[1150]: time="2025-05-10T03:36:50.354607191Z" level=info msg="RemovePodSandbox \"a13813133bc58959a31edea2f9c9b16b7406ece8347755b969cf9937e81491ed\" returns successfully" May 10 03:37:37.371740 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.Uj0igr.mount: Deactivated successfully. May 10 03:37:44.892000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:44.896498 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 03:37:44.896694 kernel: audit: type=1400 audit(1746848264.892:1374): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:44.892000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:44.923765 kernel: audit: type=1400 audit(1746848264.892:1375): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:44.923850 kernel: audit: type=1300 audit(1746848264.892:1374): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026569f0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:44.892000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0026569f0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:44.892000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:44.957022 kernel: audit: type=1327 audit(1746848264.892:1374): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:44.892000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d70ec0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:44.968699 kernel: audit: type=1300 audit(1746848264.892:1375): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002d70ec0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:44.892000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:44.975708 kernel: audit: type=1327 audit(1746848264.892:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:45.304000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:45.304000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c009f66100 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:37:45.320264 kernel: audit: type=1400 audit(1746848265.304:1376): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:45.320374 kernel: audit: type=1300 audit(1746848265.304:1376): arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c009f66100 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:37:45.320428 kernel: audit: type=1327 audit(1746848265.304:1376): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:37:45.304000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:37:45.305000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:45.335262 kernel: audit: type=1400 audit(1746848265.305:1377): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:45.305000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0059f10b0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:37:45.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:37:45.306000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:45.306000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0059f1410 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:37:45.306000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:37:45.321000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:45.321000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c004ac8cf0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:37:45.321000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:37:45.328000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:45.328000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0049ff0e0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:37:45.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:37:45.328000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:45.328000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0059f1950 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:37:45.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:37:48.898000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1110980241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c400 tclass=file permissive=0 May 10 03:37:48.898000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000bb71e0 a2=fc6 a3=0 items=0 ppid=3255 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 key=(null) May 10 03:37:48.898000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:37:49.341000 audit[4029]: AVC avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:37:49.341000 audit[4029]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001314700 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:37:49.341000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:37:50.261000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:50.265492 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 03:37:50.265652 kernel: audit: type=1400 audit(1746848270.261:1384): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:50.261000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bcbce0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:50.300115 kernel: audit: type=1300 audit(1746848270.261:1384): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bcbce0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:50.300340 kernel: audit: type=1327 audit(1746848270.261:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:50.261000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:50.267000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:50.331725 kernel: audit: type=1400 audit(1746848270.267:1385): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:50.331889 kernel: audit: type=1300 audit(1746848270.267:1385): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bcbd00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:50.267000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bcbd00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:50.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:50.348674 kernel: audit: type=1327 audit(1746848270.267:1385): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:50.348800 kernel: audit: type=1400 audit(1746848270.267:1386): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:50.267000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:50.354661 kernel: audit: type=1300 audit(1746848270.267:1386): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bcbd20 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:50.267000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002bcbd20 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:50.362540 kernel: audit: type=1327 audit(1746848270.267:1386): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:50.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:50.369354 kernel: audit: type=1400 audit(1746848270.268:1387): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:50.268000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:37:50.268000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002d711a0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:37:50.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:37:54.859190 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.f3MLOw.mount: Deactivated successfully. May 10 03:37:57.700228 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.51nNnc.mount: Deactivated successfully. May 10 03:38:24.899398 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.tqVtSW.mount: Deactivated successfully. May 10 03:38:27.724137 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.pNqJVZ.mount: Deactivated successfully. May 10 03:38:37.219000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.212:22-172.24.4.1:35992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:37.219079 systemd[1]: Started sshd@9-172.24.4.212:22-172.24.4.1:35992.service. May 10 03:38:37.224313 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 03:38:37.224483 kernel: audit: type=1130 audit(1746848317.219:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.212:22-172.24.4.1:35992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:37.348882 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.RR8uvc.mount: Deactivated successfully. May 10 03:38:38.456000 audit[5028]: USER_ACCT pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:38.458396 sshd[5028]: Accepted publickey for core from 172.24.4.1 port 35992 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:38:38.465354 kernel: audit: type=1101 audit(1746848318.456:1389): pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:38.467000 audit[5028]: CRED_ACQ pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:38.469673 sshd[5028]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:38:38.475395 kernel: audit: type=1103 audit(1746848318.467:1390): pid=5028 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:38.475642 kernel: audit: type=1006 audit(1746848318.467:1391): pid=5028 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 10 03:38:38.467000 audit[5028]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc19487d10 a2=3 a3=0 items=0 ppid=1 pid=5028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:38:38.492518 kernel: audit: type=1300 audit(1746848318.467:1391): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc19487d10 a2=3 a3=0 items=0 ppid=1 pid=5028 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:38:38.492792 kernel: audit: type=1327 audit(1746848318.467:1391): proctitle=737368643A20636F7265205B707269765D May 10 03:38:38.467000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:38:38.491099 systemd[1]: Started session-10.scope. May 10 03:38:38.495445 systemd-logind[1143]: New session 10 of user core. May 10 03:38:38.508000 audit[5028]: USER_START pid=5028 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:38.511000 audit[5050]: CRED_ACQ pid=5050 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:38.521696 kernel: audit: type=1105 audit(1746848318.508:1392): pid=5028 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:38.521866 kernel: audit: type=1103 audit(1746848318.511:1393): pid=5050 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:39.130252 sshd[5028]: pam_unix(sshd:session): session closed for user core May 10 03:38:39.132000 audit[5028]: USER_END pid=5028 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:39.133000 audit[5028]: CRED_DISP pid=5028 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:39.150517 systemd[1]: sshd@9-172.24.4.212:22-172.24.4.1:35992.service: Deactivated successfully. May 10 03:38:39.152782 systemd[1]: session-10.scope: Deactivated successfully. May 10 03:38:39.155128 systemd-logind[1143]: Session 10 logged out. Waiting for processes to exit. May 10 03:38:39.157088 systemd-logind[1143]: Removed session 10. May 10 03:38:39.162814 kernel: audit: type=1106 audit(1746848319.132:1394): pid=5028 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:39.162931 kernel: audit: type=1104 audit(1746848319.133:1395): pid=5028 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:39.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-172.24.4.212:22-172.24.4.1:35992 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:44.149697 systemd[1]: Started sshd@10-172.24.4.212:22-172.24.4.1:49410.service. May 10 03:38:44.172514 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 03:38:44.172735 kernel: audit: type=1130 audit(1746848324.150:1397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.212:22-172.24.4.1:49410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:44.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.212:22-172.24.4.1:49410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:44.893000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:44.909609 kernel: audit: type=1400 audit(1746848324.893:1398): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:44.909783 kernel: audit: type=1300 audit(1746848324.893:1398): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b1b410 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:44.893000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000b1b410 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:44.928487 kernel: audit: type=1327 audit(1746848324.893:1398): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:44.893000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:44.894000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:44.958177 kernel: audit: type=1400 audit(1746848324.894:1399): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:44.958503 kernel: audit: type=1300 audit(1746848324.894:1399): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010c1a80 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:44.894000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0010c1a80 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:44.894000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:44.992606 kernel: audit: type=1327 audit(1746848324.894:1399): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:45.305000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:45.320330 kernel: audit: type=1400 audit(1746848325.305:1400): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:45.305000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:45.305000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0046dbd40 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:38:45.362781 kernel: audit: type=1400 audit(1746848325.305:1401): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:45.363219 kernel: audit: type=1300 audit(1746848325.305:1401): arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0046dbd40 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:38:45.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:38:45.306000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:45.306000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0046dbdd0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:38:45.306000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:38:45.305000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c009d2e640 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:38:45.305000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:38:45.322000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:45.322000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0038ff6e0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:38:45.322000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:38:45.329000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:45.329000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00298c060 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:38:45.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:38:45.329000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:45.329000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c009d2f060 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:38:45.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:38:45.560000 audit[5062]: USER_ACCT pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:45.561260 sshd[5062]: Accepted publickey for core from 172.24.4.1 port 49410 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:38:45.564000 audit[5062]: CRED_ACQ pid=5062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:45.564000 audit[5062]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4d1224b0 a2=3 a3=0 items=0 ppid=1 pid=5062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:38:45.564000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:38:45.565801 sshd[5062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:38:45.582648 systemd[1]: Started session-11.scope. May 10 03:38:45.585536 systemd-logind[1143]: New session 11 of user core. May 10 03:38:45.613000 audit[5062]: USER_START pid=5062 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:45.617000 audit[5067]: CRED_ACQ pid=5067 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:46.295947 sshd[5062]: pam_unix(sshd:session): session closed for user core May 10 03:38:46.297000 audit[5062]: USER_END pid=5062 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:46.297000 audit[5062]: CRED_DISP pid=5062 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:46.299364 systemd-logind[1143]: Session 11 logged out. Waiting for processes to exit. May 10 03:38:46.299723 systemd[1]: sshd@10-172.24.4.212:22-172.24.4.1:49410.service: Deactivated successfully. May 10 03:38:46.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-172.24.4.212:22-172.24.4.1:49410 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:46.300658 systemd[1]: session-11.scope: Deactivated successfully. May 10 03:38:46.301920 systemd-logind[1143]: Removed session 11. May 10 03:38:48.901000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1110980241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c400 tclass=file permissive=0 May 10 03:38:48.901000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d226c0 a2=fc6 a3=0 items=0 ppid=3255 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 key=(null) May 10 03:38:48.901000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:38:49.342000 audit[4029]: AVC avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:38:49.345985 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 03:38:49.346197 kernel: audit: type=1400 audit(1746848329.342:1415): avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:38:49.342000 audit[4029]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0013146c0 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:38:49.342000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:38:49.398127 kernel: audit: type=1300 audit(1746848329.342:1415): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0013146c0 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:38:49.398344 kernel: audit: type=1327 audit(1746848329.342:1415): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:38:50.263000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:50.263000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e82060 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:50.297142 kernel: audit: type=1400 audit(1746848330.263:1416): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:50.297413 kernel: audit: type=1300 audit(1746848330.263:1416): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e82060 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:50.263000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:50.267000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:50.329066 kernel: audit: type=1327 audit(1746848330.263:1416): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:50.329264 kernel: audit: type=1400 audit(1746848330.267:1417): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:50.329372 kernel: audit: type=1300 audit(1746848330.267:1417): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e82260 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:50.267000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e82260 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:50.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:50.349925 kernel: audit: type=1327 audit(1746848330.267:1417): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:50.350081 kernel: audit: type=1400 audit(1746848330.268:1418): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:50.268000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:50.268000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e82460 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:50.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:50.269000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:38:50.269000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000e83140 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:38:50.269000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:38:51.312058 systemd[1]: Started sshd@11-172.24.4.212:22-172.24.4.1:49422.service. May 10 03:38:51.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.212:22-172.24.4.1:49422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:52.844000 audit[5096]: USER_ACCT pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:52.845476 sshd[5096]: Accepted publickey for core from 172.24.4.1 port 49422 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:38:52.847000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:52.848000 audit[5096]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4d32ebb0 a2=3 a3=0 items=0 ppid=1 pid=5096 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:38:52.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:38:52.849882 sshd[5096]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:38:52.862710 systemd-logind[1143]: New session 12 of user core. May 10 03:38:52.890726 systemd[1]: Started session-12.scope. May 10 03:38:52.906000 audit[5096]: USER_START pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:52.910000 audit[5098]: CRED_ACQ pid=5098 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:53.774077 sshd[5096]: pam_unix(sshd:session): session closed for user core May 10 03:38:53.776000 audit[5096]: USER_END pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:53.776000 audit[5096]: CRED_DISP pid=5096 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:38:53.778848 systemd[1]: sshd@11-172.24.4.212:22-172.24.4.1:49422.service: Deactivated successfully. May 10 03:38:53.778000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-172.24.4.212:22-172.24.4.1:49422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:53.780542 systemd[1]: session-12.scope: Deactivated successfully. May 10 03:38:53.781698 systemd-logind[1143]: Session 12 logged out. Waiting for processes to exit. May 10 03:38:53.782935 systemd-logind[1143]: Removed session 12. May 10 03:38:54.920902 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.Lmmh5g.mount: Deactivated successfully. May 10 03:38:57.698831 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.nKbdJZ.mount: Deactivated successfully. May 10 03:38:58.785579 systemd[1]: Started sshd@12-172.24.4.212:22-172.24.4.1:52430.service. May 10 03:38:58.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.212:22-172.24.4.1:52430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:38:58.790091 kernel: kauditd_printk_skb: 16 callbacks suppressed May 10 03:38:58.790317 kernel: audit: type=1130 audit(1746848338.786:1429): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.212:22-172.24.4.1:52430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:00.005000 audit[5148]: USER_ACCT pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.009778 sshd[5148]: Accepted publickey for core from 172.24.4.1 port 52430 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:00.021000 audit[5148]: CRED_ACQ pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.023941 sshd[5148]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:00.036458 kernel: audit: type=1101 audit(1746848340.005:1430): pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.036654 kernel: audit: type=1103 audit(1746848340.021:1431): pid=5148 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.044722 systemd[1]: Started session-13.scope. May 10 03:39:00.021000 audit[5148]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8675a6f0 a2=3 a3=0 items=0 ppid=1 pid=5148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:00.050024 systemd-logind[1143]: New session 13 of user core. May 10 03:39:00.061826 kernel: audit: type=1006 audit(1746848340.021:1432): pid=5148 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 May 10 03:39:00.062212 kernel: audit: type=1300 audit(1746848340.021:1432): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8675a6f0 a2=3 a3=0 items=0 ppid=1 pid=5148 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:00.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:00.068596 kernel: audit: type=1327 audit(1746848340.021:1432): proctitle=737368643A20636F7265205B707269765D May 10 03:39:00.069715 kernel: audit: type=1105 audit(1746848340.068:1433): pid=5148 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.068000 audit[5148]: USER_START pid=5148 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.078096 kernel: audit: type=1103 audit(1746848340.077:1434): pid=5150 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.077000 audit[5150]: CRED_ACQ pid=5150 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.817400 sshd[5148]: pam_unix(sshd:session): session closed for user core May 10 03:39:00.820000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.212:22-172.24.4.1:52444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:00.820873 systemd[1]: Started sshd@13-172.24.4.212:22-172.24.4.1:52444.service. May 10 03:39:00.834376 kernel: audit: type=1130 audit(1746848340.820:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.212:22-172.24.4.1:52444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:00.834687 kernel: audit: type=1106 audit(1746848340.824:1436): pid=5148 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.824000 audit[5148]: USER_END pid=5148 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.824000 audit[5148]: CRED_DISP pid=5148 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:00.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-172.24.4.212:22-172.24.4.1:52430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:00.827817 systemd[1]: sshd@12-172.24.4.212:22-172.24.4.1:52430.service: Deactivated successfully. May 10 03:39:00.830375 systemd[1]: session-13.scope: Deactivated successfully. May 10 03:39:00.835723 systemd-logind[1143]: Session 13 logged out. Waiting for processes to exit. May 10 03:39:00.837892 systemd-logind[1143]: Removed session 13. May 10 03:39:02.037042 sshd[5160]: Accepted publickey for core from 172.24.4.1 port 52444 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:02.036000 audit[5160]: USER_ACCT pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:02.040000 audit[5160]: CRED_ACQ pid=5160 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:02.041000 audit[5160]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa07b5160 a2=3 a3=0 items=0 ppid=1 pid=5160 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:02.041000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:02.042540 sshd[5160]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:02.054791 systemd[1]: Started session-14.scope. May 10 03:39:02.054870 systemd-logind[1143]: New session 14 of user core. May 10 03:39:02.085000 audit[5160]: USER_START pid=5160 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:02.089000 audit[5163]: CRED_ACQ pid=5163 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:02.819245 sshd[5160]: pam_unix(sshd:session): session closed for user core May 10 03:39:02.820000 audit[5160]: USER_END pid=5160 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:02.820000 audit[5160]: CRED_DISP pid=5160 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:02.822243 systemd[1]: sshd@13-172.24.4.212:22-172.24.4.1:52444.service: Deactivated successfully. May 10 03:39:02.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-172.24.4.212:22-172.24.4.1:52444 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:02.823815 systemd[1]: session-14.scope: Deactivated successfully. May 10 03:39:02.824950 systemd-logind[1143]: Session 14 logged out. Waiting for processes to exit. May 10 03:39:02.828263 systemd[1]: Started sshd@14-172.24.4.212:22-172.24.4.1:52450.service. May 10 03:39:02.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.212:22-172.24.4.1:52450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:02.832257 systemd-logind[1143]: Removed session 14. May 10 03:39:04.131231 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 03:39:04.132911 kernel: audit: type=1101 audit(1746848344.123:1448): pid=5171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.123000 audit[5171]: USER_ACCT pid=5171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.130201 sshd[5171]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:04.135263 sshd[5171]: Accepted publickey for core from 172.24.4.1 port 52450 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:04.128000 audit[5171]: CRED_ACQ pid=5171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.163488 kernel: audit: type=1103 audit(1746848344.128:1449): pid=5171 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.128000 audit[5171]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffadaf4820 a2=3 a3=0 items=0 ppid=1 pid=5171 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:04.188445 kernel: audit: type=1006 audit(1746848344.128:1450): pid=5171 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 10 03:39:04.188651 kernel: audit: type=1300 audit(1746848344.128:1450): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffadaf4820 a2=3 a3=0 items=0 ppid=1 pid=5171 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:04.189647 kernel: audit: type=1327 audit(1746848344.128:1450): proctitle=737368643A20636F7265205B707269765D May 10 03:39:04.128000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:04.205509 systemd-logind[1143]: New session 15 of user core. May 10 03:39:04.207140 systemd[1]: Started session-15.scope. May 10 03:39:04.222000 audit[5171]: USER_START pid=5171 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.230320 kernel: audit: type=1105 audit(1746848344.222:1451): pid=5171 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.230000 audit[5173]: CRED_ACQ pid=5173 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.237374 kernel: audit: type=1103 audit(1746848344.230:1452): pid=5173 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.817701 sshd[5171]: pam_unix(sshd:session): session closed for user core May 10 03:39:04.819000 audit[5171]: USER_END pid=5171 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.837353 kernel: audit: type=1106 audit(1746848344.819:1453): pid=5171 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.843823 kernel: audit: type=1104 audit(1746848344.819:1454): pid=5171 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.819000 audit[5171]: CRED_DISP pid=5171 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:04.838483 systemd[1]: sshd@14-172.24.4.212:22-172.24.4.1:52450.service: Deactivated successfully. May 10 03:39:04.841338 systemd[1]: session-15.scope: Deactivated successfully. May 10 03:39:04.844343 systemd-logind[1143]: Session 15 logged out. Waiting for processes to exit. May 10 03:39:04.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.212:22-172.24.4.1:52450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:04.857337 kernel: audit: type=1131 audit(1746848344.837:1455): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-172.24.4.212:22-172.24.4.1:52450 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:04.857216 systemd-logind[1143]: Removed session 15. May 10 03:39:09.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.212:22-172.24.4.1:38480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:09.867785 kernel: audit: type=1130 audit(1746848349.850:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.212:22-172.24.4.1:38480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:09.850449 systemd[1]: Started sshd@15-172.24.4.212:22-172.24.4.1:38480.service. May 10 03:39:10.998143 sshd[5186]: Accepted publickey for core from 172.24.4.1 port 38480 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:10.997000 audit[5186]: USER_ACCT pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.016367 kernel: audit: type=1101 audit(1746848350.997:1457): pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.017141 sshd[5186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:11.015000 audit[5186]: CRED_ACQ pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.059352 kernel: audit: type=1103 audit(1746848351.015:1458): pid=5186 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.059731 kernel: audit: type=1006 audit(1746848351.015:1459): pid=5186 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 10 03:39:11.059838 kernel: audit: type=1300 audit(1746848351.015:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25b69460 a2=3 a3=0 items=0 ppid=1 pid=5186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:11.015000 audit[5186]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25b69460 a2=3 a3=0 items=0 ppid=1 pid=5186 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:11.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:11.073823 kernel: audit: type=1327 audit(1746848351.015:1459): proctitle=737368643A20636F7265205B707269765D May 10 03:39:11.081047 systemd[1]: Started session-16.scope. May 10 03:39:11.082303 systemd-logind[1143]: New session 16 of user core. May 10 03:39:11.094000 audit[5186]: USER_START pid=5186 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.105033 kernel: audit: type=1105 audit(1746848351.094:1460): pid=5186 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.105188 kernel: audit: type=1103 audit(1746848351.104:1461): pid=5188 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.104000 audit[5188]: CRED_ACQ pid=5188 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.698627 sshd[5186]: pam_unix(sshd:session): session closed for user core May 10 03:39:11.701000 audit[5186]: USER_END pid=5186 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.705758 systemd[1]: sshd@15-172.24.4.212:22-172.24.4.1:38480.service: Deactivated successfully. May 10 03:39:11.708695 systemd[1]: session-16.scope: Deactivated successfully. May 10 03:39:11.718329 kernel: audit: type=1106 audit(1746848351.701:1462): pid=5186 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.701000 audit[5186]: CRED_DISP pid=5186 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.732586 systemd-logind[1143]: Session 16 logged out. Waiting for processes to exit. May 10 03:39:11.733381 kernel: audit: type=1104 audit(1746848351.701:1463): pid=5186 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:11.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-172.24.4.212:22-172.24.4.1:38480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:11.735488 systemd-logind[1143]: Removed session 16. May 10 03:39:16.715899 systemd[1]: Started sshd@16-172.24.4.212:22-172.24.4.1:33520.service. May 10 03:39:16.732945 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 03:39:16.733254 kernel: audit: type=1130 audit(1746848356.716:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.212:22-172.24.4.1:33520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:16.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.212:22-172.24.4.1:33520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:18.128901 sshd[5202]: Accepted publickey for core from 172.24.4.1 port 33520 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:18.128000 audit[5202]: USER_ACCT pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:18.144718 sshd[5202]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:18.145612 kernel: audit: type=1101 audit(1746848358.128:1466): pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:18.129000 audit[5202]: CRED_ACQ pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:18.171719 kernel: audit: type=1103 audit(1746848358.129:1467): pid=5202 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:18.171933 kernel: audit: type=1006 audit(1746848358.129:1468): pid=5202 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 10 03:39:18.129000 audit[5202]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff64de53f0 a2=3 a3=0 items=0 ppid=1 pid=5202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:18.197414 kernel: audit: type=1300 audit(1746848358.129:1468): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff64de53f0 a2=3 a3=0 items=0 ppid=1 pid=5202 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:18.197601 kernel: audit: type=1327 audit(1746848358.129:1468): proctitle=737368643A20636F7265205B707269765D May 10 03:39:18.129000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:18.206150 systemd-logind[1143]: New session 17 of user core. May 10 03:39:18.210385 systemd[1]: Started session-17.scope. May 10 03:39:18.224000 audit[5202]: USER_START pid=5202 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:18.243339 kernel: audit: type=1105 audit(1746848358.224:1469): pid=5202 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:18.234000 audit[5204]: CRED_ACQ pid=5204 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:18.257372 kernel: audit: type=1103 audit(1746848358.234:1470): pid=5204 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:19.009664 sshd[5202]: pam_unix(sshd:session): session closed for user core May 10 03:39:19.032450 kernel: audit: type=1106 audit(1746848359.013:1471): pid=5202 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:19.013000 audit[5202]: USER_END pid=5202 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:19.016000 audit[5202]: CRED_DISP pid=5202 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:19.037223 systemd-logind[1143]: Session 17 logged out. Waiting for processes to exit. May 10 03:39:19.041315 systemd[1]: sshd@16-172.24.4.212:22-172.24.4.1:33520.service: Deactivated successfully. May 10 03:39:19.043054 systemd[1]: session-17.scope: Deactivated successfully. May 10 03:39:19.046453 kernel: audit: type=1104 audit(1746848359.016:1472): pid=5202 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:19.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-172.24.4.212:22-172.24.4.1:33520 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:19.049068 systemd-logind[1143]: Removed session 17. May 10 03:39:24.042014 systemd[1]: Started sshd@17-172.24.4.212:22-172.24.4.1:45980.service. May 10 03:39:24.062026 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 03:39:24.062389 kernel: audit: type=1130 audit(1746848364.045:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.212:22-172.24.4.1:45980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:24.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.212:22-172.24.4.1:45980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:25.480000 audit[5215]: USER_ACCT pid=5215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:25.481889 sshd[5215]: Accepted publickey for core from 172.24.4.1 port 45980 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:25.489369 kernel: audit: type=1101 audit(1746848365.480:1475): pid=5215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:25.490000 audit[5215]: CRED_ACQ pid=5215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:25.492639 sshd[5215]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:25.524558 kernel: audit: type=1103 audit(1746848365.490:1476): pid=5215 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:25.525515 kernel: audit: type=1006 audit(1746848365.491:1477): pid=5215 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 10 03:39:25.525690 kernel: audit: type=1300 audit(1746848365.491:1477): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd66c31ca0 a2=3 a3=0 items=0 ppid=1 pid=5215 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:25.491000 audit[5215]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd66c31ca0 a2=3 a3=0 items=0 ppid=1 pid=5215 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:25.520718 systemd-logind[1143]: New session 18 of user core. May 10 03:39:25.522543 systemd[1]: Started session-18.scope. May 10 03:39:25.491000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:25.536338 kernel: audit: type=1327 audit(1746848365.491:1477): proctitle=737368643A20636F7265205B707269765D May 10 03:39:25.549000 audit[5215]: USER_START pid=5215 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:25.567395 kernel: audit: type=1105 audit(1746848365.549:1478): pid=5215 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:25.550000 audit[5239]: CRED_ACQ pid=5239 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:25.577345 kernel: audit: type=1103 audit(1746848365.550:1479): pid=5239 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:26.243505 sshd[5215]: pam_unix(sshd:session): session closed for user core May 10 03:39:26.248000 audit[5215]: USER_END pid=5215 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:26.257575 kernel: audit: type=1106 audit(1746848366.248:1480): pid=5215 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:26.265342 kernel: audit: type=1104 audit(1746848366.249:1481): pid=5215 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:26.249000 audit[5215]: CRED_DISP pid=5215 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:26.259380 systemd[1]: sshd@17-172.24.4.212:22-172.24.4.1:45980.service: Deactivated successfully. May 10 03:39:26.265716 systemd[1]: session-18.scope: Deactivated successfully. May 10 03:39:26.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-172.24.4.212:22-172.24.4.1:45980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:26.272158 systemd-logind[1143]: Session 18 logged out. Waiting for processes to exit. May 10 03:39:26.274233 systemd-logind[1143]: Removed session 18. May 10 03:39:27.727065 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.kq0BA6.mount: Deactivated successfully. May 10 03:39:31.254905 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 03:39:31.255138 kernel: audit: type=1130 audit(1746848371.250:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.212:22-172.24.4.1:45988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:31.250000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.212:22-172.24.4.1:45988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:31.250212 systemd[1]: Started sshd@18-172.24.4.212:22-172.24.4.1:45988.service. May 10 03:39:32.765000 audit[5267]: USER_ACCT pid=5267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:32.783138 sshd[5267]: Accepted publickey for core from 172.24.4.1 port 45988 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:32.784093 kernel: audit: type=1101 audit(1746848372.765:1484): pid=5267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:32.772029 sshd[5267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:32.768000 audit[5267]: CRED_ACQ pid=5267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:32.803562 kernel: audit: type=1103 audit(1746848372.768:1485): pid=5267 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:32.813327 kernel: audit: type=1006 audit(1746848372.768:1486): pid=5267 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 10 03:39:32.814766 kernel: audit: type=1300 audit(1746848372.768:1486): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc24083220 a2=3 a3=0 items=0 ppid=1 pid=5267 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:32.768000 audit[5267]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc24083220 a2=3 a3=0 items=0 ppid=1 pid=5267 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:32.830901 kernel: audit: type=1327 audit(1746848372.768:1486): proctitle=737368643A20636F7265205B707269765D May 10 03:39:32.768000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:32.840634 systemd-logind[1143]: New session 19 of user core. May 10 03:39:32.841052 systemd[1]: Started session-19.scope. May 10 03:39:32.854000 audit[5267]: USER_START pid=5267 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:32.862501 kernel: audit: type=1105 audit(1746848372.854:1487): pid=5267 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:32.863000 audit[5269]: CRED_ACQ pid=5269 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:32.869316 kernel: audit: type=1103 audit(1746848372.863:1488): pid=5269 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:33.607813 sshd[5267]: pam_unix(sshd:session): session closed for user core May 10 03:39:33.612164 systemd[1]: Started sshd@19-172.24.4.212:22-172.24.4.1:37970.service. May 10 03:39:33.612000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.212:22-172.24.4.1:37970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:33.618429 kernel: audit: type=1130 audit(1746848373.612:1489): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.212:22-172.24.4.1:37970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:33.619000 audit[5267]: USER_END pid=5267 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:33.623317 systemd[1]: sshd@18-172.24.4.212:22-172.24.4.1:45988.service: Deactivated successfully. May 10 03:39:33.625175 systemd[1]: session-19.scope: Deactivated successfully. May 10 03:39:33.627360 kernel: audit: type=1106 audit(1746848373.619:1490): pid=5267 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:33.619000 audit[5267]: CRED_DISP pid=5267 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:33.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-172.24.4.212:22-172.24.4.1:45988 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:33.628562 systemd-logind[1143]: Session 19 logged out. Waiting for processes to exit. May 10 03:39:33.629658 systemd-logind[1143]: Removed session 19. May 10 03:39:35.002000 audit[5278]: USER_ACCT pid=5278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:35.004000 audit[5278]: CRED_ACQ pid=5278 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:35.005000 audit[5278]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6b617b00 a2=3 a3=0 items=0 ppid=1 pid=5278 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:35.005000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:35.008086 sshd[5278]: Accepted publickey for core from 172.24.4.1 port 37970 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:35.007824 sshd[5278]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:35.019577 systemd-logind[1143]: New session 20 of user core. May 10 03:39:35.021528 systemd[1]: Started session-20.scope. May 10 03:39:35.040000 audit[5278]: USER_START pid=5278 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:35.044000 audit[5283]: CRED_ACQ pid=5283 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:36.228855 sshd[5278]: pam_unix(sshd:session): session closed for user core May 10 03:39:36.235000 audit[5278]: USER_END pid=5278 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:36.235000 audit[5278]: CRED_DISP pid=5278 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:36.238093 systemd[1]: Started sshd@20-172.24.4.212:22-172.24.4.1:37974.service. May 10 03:39:36.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.212:22-172.24.4.1:37974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:36.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-172.24.4.212:22-172.24.4.1:37970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:36.245737 systemd[1]: sshd@19-172.24.4.212:22-172.24.4.1:37970.service: Deactivated successfully. May 10 03:39:36.248242 systemd[1]: session-20.scope: Deactivated successfully. May 10 03:39:36.253657 systemd-logind[1143]: Session 20 logged out. Waiting for processes to exit. May 10 03:39:36.256795 systemd-logind[1143]: Removed session 20. May 10 03:39:37.418749 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.yzZAg0.mount: Deactivated successfully. May 10 03:39:37.563124 sshd[5289]: Accepted publickey for core from 172.24.4.1 port 37974 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:37.570344 kernel: kauditd_printk_skb: 13 callbacks suppressed May 10 03:39:37.570907 kernel: audit: type=1101 audit(1746848377.562:1502): pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:37.562000 audit[5289]: USER_ACCT pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:37.569850 sshd[5289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:37.565000 audit[5289]: CRED_ACQ pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:37.583661 kernel: audit: type=1103 audit(1746848377.565:1503): pid=5289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:37.589816 kernel: audit: type=1006 audit(1746848377.565:1504): pid=5289 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 10 03:39:37.592424 kernel: audit: type=1300 audit(1746848377.565:1504): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd52735450 a2=3 a3=0 items=0 ppid=1 pid=5289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:37.565000 audit[5289]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd52735450 a2=3 a3=0 items=0 ppid=1 pid=5289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:37.599866 kernel: audit: type=1327 audit(1746848377.565:1504): proctitle=737368643A20636F7265205B707269765D May 10 03:39:37.565000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:37.611793 systemd-logind[1143]: New session 21 of user core. May 10 03:39:37.613650 systemd[1]: Started session-21.scope. May 10 03:39:37.639827 kernel: audit: type=1105 audit(1746848377.625:1505): pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:37.625000 audit[5289]: USER_START pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:37.640000 audit[5311]: CRED_ACQ pid=5311 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:37.648326 kernel: audit: type=1103 audit(1746848377.640:1506): pid=5311 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:40.819000 audit[5321]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:40.819000 audit[5321]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff1bbd4860 a2=0 a3=7fff1bbd484c items=0 ppid=2165 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:40.832390 kernel: audit: type=1325 audit(1746848380.819:1507): table=filter:121 family=2 entries=20 op=nft_register_rule pid=5321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:40.832482 kernel: audit: type=1300 audit(1746848380.819:1507): arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff1bbd4860 a2=0 a3=7fff1bbd484c items=0 ppid=2165 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:40.819000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:39:40.839307 kernel: audit: type=1327 audit(1746848380.819:1507): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:39:40.838000 audit[5321]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:40.838000 audit[5321]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff1bbd4860 a2=0 a3=0 items=0 ppid=2165 pid=5321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:40.838000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:39:40.907000 audit[5323]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:40.907000 audit[5323]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd34d84120 a2=0 a3=7ffd34d8410c items=0 ppid=2165 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:40.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:39:40.913000 audit[5323]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5323 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:40.913000 audit[5323]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd34d84120 a2=0 a3=0 items=0 ppid=2165 pid=5323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:40.913000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:39:41.085438 sshd[5289]: pam_unix(sshd:session): session closed for user core May 10 03:39:41.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.212:22-172.24.4.1:37978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:41.089807 systemd[1]: Started sshd@21-172.24.4.212:22-172.24.4.1:37978.service. May 10 03:39:41.093000 audit[5289]: USER_END pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:41.093000 audit[5289]: CRED_DISP pid=5289 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:41.096634 systemd[1]: sshd@20-172.24.4.212:22-172.24.4.1:37974.service: Deactivated successfully. May 10 03:39:41.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-172.24.4.212:22-172.24.4.1:37974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:41.097561 systemd[1]: session-21.scope: Deactivated successfully. May 10 03:39:41.101400 systemd-logind[1143]: Session 21 logged out. Waiting for processes to exit. May 10 03:39:41.107534 systemd-logind[1143]: Removed session 21. May 10 03:39:42.275000 audit[5325]: USER_ACCT pid=5325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:42.276414 sshd[5325]: Accepted publickey for core from 172.24.4.1 port 37978 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:42.277000 audit[5325]: CRED_ACQ pid=5325 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:42.277000 audit[5325]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff16554160 a2=3 a3=0 items=0 ppid=1 pid=5325 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:42.277000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:42.278884 sshd[5325]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:42.286468 systemd[1]: Started session-22.scope. May 10 03:39:42.286883 systemd-logind[1143]: New session 22 of user core. May 10 03:39:42.297000 audit[5325]: USER_START pid=5325 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:42.300000 audit[5329]: CRED_ACQ pid=5329 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:43.229002 sshd[5325]: pam_unix(sshd:session): session closed for user core May 10 03:39:43.230000 audit[5325]: USER_END pid=5325 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:43.233898 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 03:39:43.234070 kernel: audit: type=1106 audit(1746848383.230:1520): pid=5325 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:43.236843 systemd[1]: sshd@21-172.24.4.212:22-172.24.4.1:37978.service: Deactivated successfully. May 10 03:39:43.237559 systemd[1]: session-22.scope: Deactivated successfully. May 10 03:39:43.242110 systemd[1]: Started sshd@22-172.24.4.212:22-172.24.4.1:37980.service. May 10 03:39:43.245589 systemd-logind[1143]: Session 22 logged out. Waiting for processes to exit. May 10 03:39:43.251257 systemd-logind[1143]: Removed session 22. May 10 03:39:43.230000 audit[5325]: CRED_DISP pid=5325 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:43.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.212:22-172.24.4.1:37978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:43.279233 kernel: audit: type=1104 audit(1746848383.230:1521): pid=5325 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:43.279387 kernel: audit: type=1131 audit(1746848383.236:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-172.24.4.212:22-172.24.4.1:37978 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:43.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.212:22-172.24.4.1:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:43.294505 kernel: audit: type=1130 audit(1746848383.244:1523): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.212:22-172.24.4.1:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:44.726000 audit[5337]: USER_ACCT pid=5337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:44.727779 sshd[5337]: Accepted publickey for core from 172.24.4.1 port 37980 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:44.741473 kernel: audit: type=1101 audit(1746848384.726:1524): pid=5337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:44.742000 audit[5337]: CRED_ACQ pid=5337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:44.746221 sshd[5337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:44.760779 kernel: audit: type=1103 audit(1746848384.742:1525): pid=5337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:44.762835 kernel: audit: type=1006 audit(1746848384.743:1526): pid=5337 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 10 03:39:44.743000 audit[5337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2bb41280 a2=3 a3=0 items=0 ppid=1 pid=5337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:44.780975 kernel: audit: type=1300 audit(1746848384.743:1526): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd2bb41280 a2=3 a3=0 items=0 ppid=1 pid=5337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:44.779550 systemd[1]: Started session-23.scope. May 10 03:39:44.743000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:44.784554 systemd-logind[1143]: New session 23 of user core. May 10 03:39:44.793366 kernel: audit: type=1327 audit(1746848384.743:1526): proctitle=737368643A20636F7265205B707269765D May 10 03:39:44.808000 audit[5337]: USER_START pid=5337 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:44.822366 kernel: audit: type=1105 audit(1746848384.808:1527): pid=5337 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:44.811000 audit[5339]: CRED_ACQ pid=5339 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:44.895000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:44.895000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:44.895000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0028c6f20 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:39:44.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:39:44.895000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002c3f7a0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:39:44.895000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:39:45.307000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:45.307000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=73 a1=c017b43620 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:39:45.307000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:39:45.307000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:45.307000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c017b57980 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:39:45.307000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:39:45.308000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:45.308000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011051500 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:39:45.308000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:39:45.328000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:45.328000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c017b579e0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:39:45.328000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:39:45.329000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:45.329000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c017b57ad0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:39:45.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:39:45.329000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:45.329000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c011051680 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:39:45.329000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:39:45.509258 sshd[5337]: pam_unix(sshd:session): session closed for user core May 10 03:39:45.510000 audit[5337]: USER_END pid=5337 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:45.510000 audit[5337]: CRED_DISP pid=5337 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:45.512144 systemd[1]: sshd@22-172.24.4.212:22-172.24.4.1:37980.service: Deactivated successfully. May 10 03:39:45.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-172.24.4.212:22-172.24.4.1:37980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:45.513484 systemd[1]: session-23.scope: Deactivated successfully. May 10 03:39:45.514395 systemd-logind[1143]: Session 23 logged out. Waiting for processes to exit. May 10 03:39:45.515905 systemd-logind[1143]: Removed session 23. May 10 03:39:48.904000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1110980241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c400 tclass=file permissive=0 May 10 03:39:48.908631 kernel: kauditd_printk_skb: 28 callbacks suppressed May 10 03:39:48.908829 kernel: audit: type=1400 audit(1746848388.904:1540): avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1110980241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c400 tclass=file permissive=0 May 10 03:39:48.904000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a15d80 a2=fc6 a3=0 items=0 ppid=3255 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 key=(null) May 10 03:39:48.943796 kernel: audit: type=1300 audit(1746848388.904:1540): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a15d80 a2=fc6 a3=0 items=0 ppid=3255 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 key=(null) May 10 03:39:48.943994 kernel: audit: type=1327 audit(1746848388.904:1540): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:39:48.904000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:39:49.345000 audit[4029]: AVC avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:39:49.345000 audit[4029]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001277560 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:39:49.360505 kernel: audit: type=1400 audit(1746848389.345:1541): avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:39:49.360723 kernel: audit: type=1300 audit(1746848389.345:1541): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001277560 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:39:49.360815 kernel: audit: type=1327 audit(1746848389.345:1541): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:39:49.345000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:39:49.567000 audit[5351]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:49.567000 audit[5351]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffef40a4320 a2=0 a3=7ffef40a430c items=0 ppid=2165 pid=5351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:49.581699 kernel: audit: type=1325 audit(1746848389.567:1542): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:49.581772 kernel: audit: type=1300 audit(1746848389.567:1542): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffef40a4320 a2=0 a3=7ffef40a430c items=0 ppid=2165 pid=5351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:49.581822 kernel: audit: type=1327 audit(1746848389.567:1542): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:39:49.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:39:49.587000 audit[5351]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:49.587000 audit[5351]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffef40a4320 a2=0 a3=7ffef40a430c items=0 ppid=2165 pid=5351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:49.592471 kernel: audit: type=1325 audit(1746848389.587:1543): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 10 03:39:49.587000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 10 03:39:50.267000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:50.267000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002876f60 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:39:50.267000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:39:50.269000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:50.269000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001217b80 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:39:50.269000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:39:50.269000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:50.269000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002877160 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:39:50.269000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:39:50.271000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:39:50.271000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001217ba0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:39:50.271000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:39:50.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.212:22-172.24.4.1:49798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:50.523005 systemd[1]: Started sshd@23-172.24.4.212:22-172.24.4.1:49798.service. May 10 03:39:51.764000 audit[5354]: USER_ACCT pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:51.768472 sshd[5354]: Accepted publickey for core from 172.24.4.1 port 49798 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:51.770000 audit[5354]: CRED_ACQ pid=5354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:51.770000 audit[5354]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6d8a5f0 a2=3 a3=0 items=0 ppid=1 pid=5354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:51.770000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:51.773323 sshd[5354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:51.790105 systemd-logind[1143]: New session 24 of user core. May 10 03:39:51.794788 systemd[1]: Started session-24.scope. May 10 03:39:51.810000 audit[5354]: USER_START pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:51.815000 audit[5356]: CRED_ACQ pid=5356 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:52.563800 sshd[5354]: pam_unix(sshd:session): session closed for user core May 10 03:39:52.565000 audit[5354]: USER_END pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:52.565000 audit[5354]: CRED_DISP pid=5354 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:52.570146 systemd[1]: sshd@23-172.24.4.212:22-172.24.4.1:49798.service: Deactivated successfully. May 10 03:39:52.570937 systemd-logind[1143]: Session 24 logged out. Waiting for processes to exit. May 10 03:39:52.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-172.24.4.212:22-172.24.4.1:49798 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:52.577689 systemd[1]: session-24.scope: Deactivated successfully. May 10 03:39:52.579143 systemd-logind[1143]: Removed session 24. May 10 03:39:54.912427 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.GiwsGO.mount: Deactivated successfully. May 10 03:39:57.584241 systemd[1]: Started sshd@24-172.24.4.212:22-172.24.4.1:45668.service. May 10 03:39:57.600548 kernel: kauditd_printk_skb: 25 callbacks suppressed May 10 03:39:57.601157 kernel: audit: type=1130 audit(1746848397.584:1557): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.212:22-172.24.4.1:45668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:57.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.212:22-172.24.4.1:45668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:39:57.697836 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.V0YgFY.mount: Deactivated successfully. May 10 03:39:58.724000 audit[5386]: USER_ACCT pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:58.726073 sshd[5386]: Accepted publickey for core from 172.24.4.1 port 45668 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:39:58.739000 audit[5386]: CRED_ACQ pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:58.741183 sshd[5386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:39:58.753993 kernel: audit: type=1101 audit(1746848398.724:1558): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:58.754271 kernel: audit: type=1103 audit(1746848398.739:1559): pid=5386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:58.766333 kernel: audit: type=1006 audit(1746848398.740:1560): pid=5386 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 10 03:39:58.740000 audit[5386]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe100a4c10 a2=3 a3=0 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:58.783467 kernel: audit: type=1300 audit(1746848398.740:1560): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe100a4c10 a2=3 a3=0 items=0 ppid=1 pid=5386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:39:58.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:39:58.792344 kernel: audit: type=1327 audit(1746848398.740:1560): proctitle=737368643A20636F7265205B707269765D May 10 03:39:58.801173 systemd[1]: Started session-25.scope. May 10 03:39:58.802244 systemd-logind[1143]: New session 25 of user core. May 10 03:39:58.824000 audit[5386]: USER_START pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:58.831000 audit[5407]: CRED_ACQ pid=5407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:58.857892 kernel: audit: type=1105 audit(1746848398.824:1561): pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:58.858168 kernel: audit: type=1103 audit(1746848398.831:1562): pid=5407 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:59.605121 sshd[5386]: pam_unix(sshd:session): session closed for user core May 10 03:39:59.606000 audit[5386]: USER_END pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:59.624362 kernel: audit: type=1106 audit(1746848399.606:1563): pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:59.624972 systemd[1]: sshd@24-172.24.4.212:22-172.24.4.1:45668.service: Deactivated successfully. May 10 03:39:59.626921 systemd[1]: session-25.scope: Deactivated successfully. May 10 03:39:59.607000 audit[5386]: CRED_DISP pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:59.642179 systemd-logind[1143]: Session 25 logged out. Waiting for processes to exit. May 10 03:39:59.642622 kernel: audit: type=1104 audit(1746848399.607:1564): pid=5386 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:39:59.647164 systemd-logind[1143]: Removed session 25. May 10 03:39:59.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-172.24.4.212:22-172.24.4.1:45668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:04.620314 systemd[1]: Started sshd@25-172.24.4.212:22-172.24.4.1:58944.service. May 10 03:40:04.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.212:22-172.24.4.1:58944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:04.626200 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 03:40:04.626420 kernel: audit: type=1130 audit(1746848404.621:1566): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.212:22-172.24.4.1:58944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:05.762000 audit[5419]: USER_ACCT pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:05.763221 sshd[5419]: Accepted publickey for core from 172.24.4.1 port 58944 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:40:05.766255 sshd[5419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:40:05.765000 audit[5419]: CRED_ACQ pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:05.789823 systemd[1]: Started session-26.scope. May 10 03:40:05.792106 kernel: audit: type=1101 audit(1746848405.762:1567): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:05.792269 kernel: audit: type=1103 audit(1746848405.765:1568): pid=5419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:05.792471 systemd-logind[1143]: New session 26 of user core. May 10 03:40:05.802396 kernel: audit: type=1006 audit(1746848405.765:1569): pid=5419 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 10 03:40:05.765000 audit[5419]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc111c480 a2=3 a3=0 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:40:05.814948 kernel: audit: type=1300 audit(1746848405.765:1569): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc111c480 a2=3 a3=0 items=0 ppid=1 pid=5419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:40:05.815078 kernel: audit: type=1327 audit(1746848405.765:1569): proctitle=737368643A20636F7265205B707269765D May 10 03:40:05.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:40:05.827000 audit[5419]: USER_START pid=5419 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:05.846248 kernel: audit: type=1105 audit(1746848405.827:1570): pid=5419 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:05.846589 kernel: audit: type=1103 audit(1746848405.845:1571): pid=5421 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:05.845000 audit[5421]: CRED_ACQ pid=5421 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:06.648745 sshd[5419]: pam_unix(sshd:session): session closed for user core May 10 03:40:06.651000 audit[5419]: USER_END pid=5419 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:06.669335 kernel: audit: type=1106 audit(1746848406.651:1572): pid=5419 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:06.669537 systemd[1]: sshd@25-172.24.4.212:22-172.24.4.1:58944.service: Deactivated successfully. May 10 03:40:06.684322 kernel: audit: type=1104 audit(1746848406.652:1573): pid=5419 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:06.652000 audit[5419]: CRED_DISP pid=5419 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:06.671744 systemd[1]: session-26.scope: Deactivated successfully. May 10 03:40:06.674041 systemd-logind[1143]: Session 26 logged out. Waiting for processes to exit. May 10 03:40:06.676500 systemd-logind[1143]: Removed session 26. May 10 03:40:06.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-172.24.4.212:22-172.24.4.1:58944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:11.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.212:22-172.24.4.1:58948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:11.658850 systemd[1]: Started sshd@26-172.24.4.212:22-172.24.4.1:58948.service. May 10 03:40:11.662717 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 03:40:11.662838 kernel: audit: type=1130 audit(1746848411.659:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.212:22-172.24.4.1:58948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:12.852000 audit[5430]: USER_ACCT pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:12.853375 sshd[5430]: Accepted publickey for core from 172.24.4.1 port 58948 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:40:12.868429 kernel: audit: type=1101 audit(1746848412.852:1576): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:12.870363 sshd[5430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:40:12.868000 audit[5430]: CRED_ACQ pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:12.887182 kernel: audit: type=1103 audit(1746848412.868:1577): pid=5430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:12.899026 systemd[1]: Started session-27.scope. May 10 03:40:12.906806 kernel: audit: type=1006 audit(1746848412.868:1578): pid=5430 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 May 10 03:40:12.907745 kernel: audit: type=1300 audit(1746848412.868:1578): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7da5960 a2=3 a3=0 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:40:12.868000 audit[5430]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff7da5960 a2=3 a3=0 items=0 ppid=1 pid=5430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:40:12.903674 systemd-logind[1143]: New session 27 of user core. May 10 03:40:12.868000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:40:12.927000 audit[5430]: USER_START pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:12.937677 kernel: audit: type=1327 audit(1746848412.868:1578): proctitle=737368643A20636F7265205B707269765D May 10 03:40:12.937817 kernel: audit: type=1105 audit(1746848412.927:1579): pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:12.932000 audit[5432]: CRED_ACQ pid=5432 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:12.943593 kernel: audit: type=1103 audit(1746848412.932:1580): pid=5432 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:13.575915 sshd[5430]: pam_unix(sshd:session): session closed for user core May 10 03:40:13.578000 audit[5430]: USER_END pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:13.597375 kernel: audit: type=1106 audit(1746848413.578:1581): pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:13.599797 systemd[1]: sshd@26-172.24.4.212:22-172.24.4.1:58948.service: Deactivated successfully. May 10 03:40:13.578000 audit[5430]: CRED_DISP pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:13.601592 systemd[1]: session-27.scope: Deactivated successfully. May 10 03:40:13.614328 kernel: audit: type=1104 audit(1746848413.578:1582): pid=5430 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:13.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-172.24.4.212:22-172.24.4.1:58948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:13.616354 systemd-logind[1143]: Session 27 logged out. Waiting for processes to exit. May 10 03:40:13.618781 systemd-logind[1143]: Removed session 27. May 10 03:40:18.587046 systemd[1]: Started sshd@27-172.24.4.212:22-172.24.4.1:39284.service. May 10 03:40:18.587000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.212:22-172.24.4.1:39284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:18.591382 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 03:40:18.591595 kernel: audit: type=1130 audit(1746848418.587:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.212:22-172.24.4.1:39284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:19.989000 audit[5442]: USER_ACCT pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:19.991773 sshd[5442]: Accepted publickey for core from 172.24.4.1 port 39284 ssh2: RSA SHA256:aPKwWoiQ1F8kPzZp1ijGURUiBBwbuUrfmZyaQlFHZYg May 10 03:40:20.007345 kernel: audit: type=1101 audit(1746848419.989:1585): pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.008758 sshd[5442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 10 03:40:20.007000 audit[5442]: CRED_ACQ pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.035422 kernel: audit: type=1103 audit(1746848420.007:1586): pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.007000 audit[5442]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25327c70 a2=3 a3=0 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:40:20.064784 kernel: audit: type=1006 audit(1746848420.007:1587): pid=5442 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 May 10 03:40:20.064904 kernel: audit: type=1300 audit(1746848420.007:1587): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd25327c70 a2=3 a3=0 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 10 03:40:20.007000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 10 03:40:20.069945 kernel: audit: type=1327 audit(1746848420.007:1587): proctitle=737368643A20636F7265205B707269765D May 10 03:40:20.069401 systemd-logind[1143]: New session 28 of user core. May 10 03:40:20.069663 systemd[1]: Started session-28.scope. May 10 03:40:20.080000 audit[5442]: USER_START pid=5442 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.089955 kernel: audit: type=1105 audit(1746848420.080:1588): pid=5442 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.090120 kernel: audit: type=1103 audit(1746848420.088:1589): pid=5444 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.088000 audit[5444]: CRED_ACQ pid=5444 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.869056 sshd[5442]: pam_unix(sshd:session): session closed for user core May 10 03:40:20.870000 audit[5442]: USER_END pid=5442 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.872967 systemd[1]: sshd@27-172.24.4.212:22-172.24.4.1:39284.service: Deactivated successfully. May 10 03:40:20.874582 systemd[1]: session-28.scope: Deactivated successfully. May 10 03:40:20.878962 kernel: audit: type=1106 audit(1746848420.870:1590): pid=5442 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.879059 kernel: audit: type=1104 audit(1746848420.870:1591): pid=5442 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.870000 audit[5442]: CRED_DISP pid=5442 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=172.24.4.1 addr=172.24.4.1 terminal=ssh res=success' May 10 03:40:20.878267 systemd-logind[1143]: Session 28 logged out. Waiting for processes to exit. May 10 03:40:20.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-172.24.4.212:22-172.24.4.1:39284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 10 03:40:20.884751 systemd-logind[1143]: Removed session 28. May 10 03:40:24.888268 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.h2UiOs.mount: Deactivated successfully. May 10 03:40:27.693379 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.mef4km.mount: Deactivated successfully. May 10 03:40:37.376724 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.jbKk2J.mount: Deactivated successfully. May 10 03:40:44.910654 kernel: kauditd_printk_skb: 1 callbacks suppressed May 10 03:40:44.912599 kernel: audit: type=1400 audit(1746848444.897:1593): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:44.897000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:44.897000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002259860 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:44.935534 kernel: audit: type=1300 audit(1746848444.897:1593): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002259860 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:44.935731 kernel: audit: type=1327 audit(1746848444.897:1593): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:44.897000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:44.902000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:44.966184 kernel: audit: type=1400 audit(1746848444.902:1594): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:44.902000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a61800 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:44.902000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:44.983142 kernel: audit: type=1300 audit(1746848444.902:1594): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a61800 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:44.983387 kernel: audit: type=1327 audit(1746848444.902:1594): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:45.309000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:45.324344 kernel: audit: type=1400 audit(1746848445.309:1595): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:45.324640 kernel: audit: type=1400 audit(1746848445.309:1596): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:45.309000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:45.309000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ba72690 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:40:45.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:40:45.381640 kernel: audit: type=1300 audit(1746848445.309:1596): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ba72690 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:40:45.382004 kernel: audit: type=1327 audit(1746848445.309:1596): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:40:45.309000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:45.309000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ba727e0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:40:45.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:40:45.309000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00c7e2040 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:40:45.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:40:45.338000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:45.338000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00c7e2240 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:40:45.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:40:45.338000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:45.338000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c00ba72810 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:40:45.338000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:40:45.339000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:45.339000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c00c0b66f0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:40:45.339000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:40:48.907000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1110980241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c400 tclass=file permissive=0 May 10 03:40:48.907000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d22460 a2=fc6 a3=0 items=0 ppid=3255 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 key=(null) May 10 03:40:48.907000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:40:49.348000 audit[4029]: AVC avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:40:49.348000 audit[4029]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00281c220 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:40:49.348000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:40:50.276539 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 03:40:50.276924 kernel: audit: type=1400 audit(1746848450.268:1603): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:50.268000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:50.268000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002259b00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:50.306057 kernel: audit: type=1300 audit(1746848450.268:1603): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002259b00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:50.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:50.321965 kernel: audit: type=1327 audit(1746848450.268:1603): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:50.322238 kernel: audit: type=1400 audit(1746848450.269:1604): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:50.269000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:50.269000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002259ce0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:50.350548 kernel: audit: type=1300 audit(1746848450.269:1604): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c002259ce0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:50.350749 kernel: audit: type=1327 audit(1746848450.269:1604): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:50.269000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:50.269000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:50.362847 kernel: audit: type=1400 audit(1746848450.269:1605): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:50.362998 kernel: audit: type=1300 audit(1746848450.269:1605): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0022f5e00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:50.269000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0022f5e00 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:50.269000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:50.376819 kernel: audit: type=1327 audit(1746848450.269:1605): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:50.377141 kernel: audit: type=1400 audit(1746848450.269:1606): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:50.269000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:40:50.269000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0022f5e20 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:40:50.269000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:40:54.912852 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.I0E4CX.mount: Deactivated successfully. May 10 03:40:57.685164 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.uwxXdQ.mount: Deactivated successfully. May 10 03:41:24.923905 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.KaM6pu.mount: Deactivated successfully. May 10 03:41:27.699485 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.iObeNe.mount: Deactivated successfully. May 10 03:41:37.347684 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.1FQZcB.mount: Deactivated successfully. May 10 03:41:44.905000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:44.909505 kernel: kauditd_printk_skb: 2 callbacks suppressed May 10 03:41:44.909799 kernel: audit: type=1400 audit(1746848504.905:1607): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:44.905000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023f18e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:44.942823 kernel: audit: type=1300 audit(1746848504.905:1607): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023f18e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:44.905000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:44.958684 kernel: audit: type=1327 audit(1746848504.905:1607): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:44.906000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:44.974141 kernel: audit: type=1400 audit(1746848504.906:1608): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:44.974376 kernel: audit: type=1300 audit(1746848504.906:1608): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016c81e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:44.906000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0016c81e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:44.906000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:44.994103 kernel: audit: type=1327 audit(1746848504.906:1608): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:45.311000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:45.327362 kernel: audit: type=1400 audit(1746848505.311:1609): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:45.312000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:45.342430 kernel: audit: type=1400 audit(1746848505.312:1610): avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:45.342692 kernel: audit: type=1300 audit(1746848505.312:1610): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0139b7700 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:41:45.312000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0139b7700 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:41:45.312000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:41:45.376879 kernel: audit: type=1327 audit(1746848505.312:1610): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:41:45.312000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520975 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:45.312000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0176c0e40 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:41:45.312000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:41:45.311000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c017830ab0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:41:45.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:41:45.337000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:45.337000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c017830cc0 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:41:45.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:41:45.337000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:45.337000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c013a1d000 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:41:45.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:41:45.337000 audit[1920]: AVC avc: denied { watch } for pid=1920 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:45.337000 audit[1920]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0176c0f90 a2=fc6 a3=0 items=0 ppid=1785 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c580,c956 key=(null) May 10 03:41:45.337000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3137322E32342E342E323132002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 May 10 03:41:48.912000 audit[3989]: AVC avc: denied { watch } for pid=3989 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1110980241/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c35,c400 tclass=file permissive=0 May 10 03:41:48.912000 audit[3989]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0003781e0 a2=fc6 a3=0 items=0 ppid=3255 pid=3989 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c35,c400 key=(null) May 10 03:41:48.912000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:41:49.352000 audit[4029]: AVC avc: denied { watch } for pid=4029 comm="apiserver" path="/calico-apiserver-certs/..2025_05_10_03_35_27.1175461746/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c137,c1023 tclass=file permissive=0 May 10 03:41:49.352000 audit[4029]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0012776c0 a2=fc6 a3=0 items=0 ppid=3471 pid=4029 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c137,c1023 key=(null) May 10 03:41:49.352000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 10 03:41:50.270000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:50.274149 kernel: kauditd_printk_skb: 20 callbacks suppressed May 10 03:41:50.274375 kernel: audit: type=1400 audit(1746848510.270:1617): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:50.271000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:50.311617 kernel: audit: type=1400 audit(1746848510.271:1618): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:50.311875 kernel: audit: type=1300 audit(1746848510.271:1618): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00297ef60 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:50.271000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00297ef60 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:50.271000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:50.344477 kernel: audit: type=1327 audit(1746848510.271:1618): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:50.344684 kernel: audit: type=1300 audit(1746848510.270:1617): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023f1ba0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:50.270000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023f1ba0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:50.352077 kernel: audit: type=1327 audit(1746848510.270:1617): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:50.270000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:50.358533 kernel: audit: type=1400 audit(1746848510.273:1619): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:50.273000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:50.273000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f1bc0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:50.372005 kernel: audit: type=1300 audit(1746848510.273:1619): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f1bc0 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:50.372192 kernel: audit: type=1327 audit(1746848510.273:1619): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:50.273000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:50.378346 kernel: audit: type=1400 audit(1746848510.274:1620): avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:50.274000 audit[1882]: AVC avc: denied { watch } for pid=1882 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520973 scontext=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 10 03:41:50.274000 audit[1882]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0023f1d60 a2=fc6 a3=0 items=0 ppid=1730 pid=1882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c313,c868 key=(null) May 10 03:41:50.274000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 10 03:41:54.904119 systemd[1]: run-containerd-runc-k8s.io-8ffefa3929afad81baf118f96566ff7f44686aff5002c6d45a7a9a6354196879-runc.ZAZINq.mount: Deactivated successfully. May 10 03:41:57.699472 systemd[1]: run-containerd-runc-k8s.io-bb7e52d63dad456d311ee8939f7961dfca7b0b63289492fdb3ccab8e70fe473c-runc.AdUckQ.mount: Deactivated successfully.