May 15 10:37:41.831265 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 10:37:41.831283 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:37:41.831291 kernel: BIOS-provided physical RAM map: May 15 10:37:41.831296 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 10:37:41.831301 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 10:37:41.831306 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 10:37:41.831313 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 15 10:37:41.831318 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 15 10:37:41.831325 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:37:41.831330 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 15 10:37:41.831335 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 10:37:41.831341 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 10:37:41.831346 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 10:37:41.831351 kernel: NX (Execute Disable) protection: active May 15 10:37:41.831359 kernel: SMBIOS 2.8 present. May 15 10:37:41.831365 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 15 10:37:41.831371 kernel: Hypervisor detected: KVM May 15 10:37:41.831377 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 10:37:41.831382 kernel: kvm-clock: cpu 0, msr 7f19a001, primary cpu clock May 15 10:37:41.831388 kernel: kvm-clock: using sched offset of 2519379615 cycles May 15 10:37:41.831395 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 10:37:41.831401 kernel: tsc: Detected 2794.748 MHz processor May 15 10:37:41.831407 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 10:37:41.831414 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 10:37:41.831420 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 15 10:37:41.831426 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 10:37:41.831432 kernel: Using GB pages for direct mapping May 15 10:37:41.831438 kernel: ACPI: Early table checksum verification disabled May 15 10:37:41.831444 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 15 10:37:41.831450 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:37:41.831456 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:37:41.831461 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:37:41.831468 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 15 10:37:41.831474 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:37:41.831480 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:37:41.831486 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:37:41.831492 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:37:41.831498 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 15 10:37:41.831504 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 15 10:37:41.831510 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 15 10:37:41.831519 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 15 10:37:41.831525 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 15 10:37:41.831531 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 15 10:37:41.831538 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 15 10:37:41.831544 kernel: No NUMA configuration found May 15 10:37:41.831550 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 15 10:37:41.831558 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 15 10:37:41.831564 kernel: Zone ranges: May 15 10:37:41.831571 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 10:37:41.831577 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 15 10:37:41.831583 kernel: Normal empty May 15 10:37:41.831589 kernel: Movable zone start for each node May 15 10:37:41.831595 kernel: Early memory node ranges May 15 10:37:41.831602 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 10:37:41.831608 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 15 10:37:41.831615 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 15 10:37:41.831622 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:37:41.831628 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 10:37:41.831634 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 15 10:37:41.831641 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 10:37:41.831647 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 10:37:41.831653 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 10:37:41.831660 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 10:37:41.831666 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 10:37:41.831672 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 10:37:41.831680 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 10:37:41.831686 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 10:37:41.831693 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 10:37:41.831699 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 10:37:41.831705 kernel: TSC deadline timer available May 15 10:37:41.831712 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 10:37:41.831718 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 10:37:41.831724 kernel: kvm-guest: setup PV sched yield May 15 10:37:41.831730 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 15 10:37:41.831738 kernel: Booting paravirtualized kernel on KVM May 15 10:37:41.831744 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 10:37:41.831751 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 10:37:41.831757 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 10:37:41.831764 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 10:37:41.831770 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 10:37:41.831776 kernel: kvm-guest: setup async PF for cpu 0 May 15 10:37:41.831782 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 15 10:37:41.831790 kernel: kvm-guest: PV spinlocks enabled May 15 10:37:41.831809 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 10:37:41.831816 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 15 10:37:41.831823 kernel: Policy zone: DMA32 May 15 10:37:41.831830 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:37:41.831837 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:37:41.831844 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:37:41.831850 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:37:41.831856 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:37:41.831864 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 134796K reserved, 0K cma-reserved) May 15 10:37:41.831871 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:37:41.831877 kernel: ftrace: allocating 34585 entries in 136 pages May 15 10:37:41.831883 kernel: ftrace: allocated 136 pages with 2 groups May 15 10:37:41.831890 kernel: rcu: Hierarchical RCU implementation. May 15 10:37:41.831897 kernel: rcu: RCU event tracing is enabled. May 15 10:37:41.831903 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:37:41.831910 kernel: Rude variant of Tasks RCU enabled. May 15 10:37:41.831916 kernel: Tracing variant of Tasks RCU enabled. May 15 10:37:41.831924 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:37:41.831930 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:37:41.831936 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 10:37:41.831943 kernel: random: crng init done May 15 10:37:41.831949 kernel: Console: colour VGA+ 80x25 May 15 10:37:41.831955 kernel: printk: console [ttyS0] enabled May 15 10:37:41.831962 kernel: ACPI: Core revision 20210730 May 15 10:37:41.831968 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 10:37:41.831975 kernel: APIC: Switch to symmetric I/O mode setup May 15 10:37:41.831982 kernel: x2apic enabled May 15 10:37:41.831988 kernel: Switched APIC routing to physical x2apic. May 15 10:37:41.831995 kernel: kvm-guest: setup PV IPIs May 15 10:37:41.832001 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 10:37:41.832007 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 10:37:41.832014 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 15 10:37:41.832020 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 10:37:41.832027 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 10:37:41.832033 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 10:37:41.832045 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 10:37:41.832051 kernel: Spectre V2 : Mitigation: Retpolines May 15 10:37:41.832058 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 10:37:41.832066 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 10:37:41.832073 kernel: RETBleed: Mitigation: untrained return thunk May 15 10:37:41.832079 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 10:37:41.832086 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 10:37:41.832102 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 10:37:41.832109 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 10:37:41.832117 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 10:37:41.832124 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 10:37:41.832131 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 10:37:41.832138 kernel: Freeing SMP alternatives memory: 32K May 15 10:37:41.832144 kernel: pid_max: default: 32768 minimum: 301 May 15 10:37:41.832151 kernel: LSM: Security Framework initializing May 15 10:37:41.832157 kernel: SELinux: Initializing. May 15 10:37:41.832164 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:37:41.832172 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:37:41.832179 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 10:37:41.832185 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 10:37:41.832192 kernel: ... version: 0 May 15 10:37:41.832199 kernel: ... bit width: 48 May 15 10:37:41.832205 kernel: ... generic registers: 6 May 15 10:37:41.832212 kernel: ... value mask: 0000ffffffffffff May 15 10:37:41.832218 kernel: ... max period: 00007fffffffffff May 15 10:37:41.832225 kernel: ... fixed-purpose events: 0 May 15 10:37:41.832233 kernel: ... event mask: 000000000000003f May 15 10:37:41.832239 kernel: signal: max sigframe size: 1776 May 15 10:37:41.832246 kernel: rcu: Hierarchical SRCU implementation. May 15 10:37:41.832253 kernel: smp: Bringing up secondary CPUs ... May 15 10:37:41.832259 kernel: x86: Booting SMP configuration: May 15 10:37:41.832266 kernel: .... node #0, CPUs: #1 May 15 10:37:41.832272 kernel: kvm-clock: cpu 1, msr 7f19a041, secondary cpu clock May 15 10:37:41.832279 kernel: kvm-guest: setup async PF for cpu 1 May 15 10:37:41.832286 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 15 10:37:41.832293 kernel: #2 May 15 10:37:41.832300 kernel: kvm-clock: cpu 2, msr 7f19a081, secondary cpu clock May 15 10:37:41.832307 kernel: kvm-guest: setup async PF for cpu 2 May 15 10:37:41.832313 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 15 10:37:41.832320 kernel: #3 May 15 10:37:41.832326 kernel: kvm-clock: cpu 3, msr 7f19a0c1, secondary cpu clock May 15 10:37:41.832333 kernel: kvm-guest: setup async PF for cpu 3 May 15 10:37:41.832339 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 15 10:37:41.832346 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:37:41.832354 kernel: smpboot: Max logical packages: 1 May 15 10:37:41.832360 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 15 10:37:41.832367 kernel: devtmpfs: initialized May 15 10:37:41.832373 kernel: x86/mm: Memory block size: 128MB May 15 10:37:41.832380 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:37:41.832387 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:37:41.832394 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:37:41.832400 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:37:41.832407 kernel: audit: initializing netlink subsys (disabled) May 15 10:37:41.832415 kernel: audit: type=2000 audit(1747305460.971:1): state=initialized audit_enabled=0 res=1 May 15 10:37:41.832421 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:37:41.832428 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 10:37:41.832434 kernel: cpuidle: using governor menu May 15 10:37:41.832441 kernel: ACPI: bus type PCI registered May 15 10:37:41.832448 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:37:41.832454 kernel: dca service started, version 1.12.1 May 15 10:37:41.832461 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 10:37:41.832468 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 10:37:41.832476 kernel: PCI: Using configuration type 1 for base access May 15 10:37:41.832483 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 10:37:41.832489 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:37:41.832496 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:37:41.832503 kernel: ACPI: Added _OSI(Module Device) May 15 10:37:41.832509 kernel: ACPI: Added _OSI(Processor Device) May 15 10:37:41.832516 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:37:41.832522 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:37:41.832529 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:37:41.832536 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:37:41.832543 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:37:41.832550 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:37:41.832556 kernel: ACPI: Interpreter enabled May 15 10:37:41.832563 kernel: ACPI: PM: (supports S0 S3 S5) May 15 10:37:41.832570 kernel: ACPI: Using IOAPIC for interrupt routing May 15 10:37:41.832576 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 10:37:41.832583 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 10:37:41.832590 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:37:41.832695 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:37:41.832767 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 10:37:41.832843 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 10:37:41.832852 kernel: PCI host bridge to bus 0000:00 May 15 10:37:41.832919 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 10:37:41.832979 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 10:37:41.833038 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 10:37:41.833112 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 10:37:41.833170 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 10:37:41.833229 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 15 10:37:41.833287 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:37:41.833363 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 10:37:41.833437 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 10:37:41.833506 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 15 10:37:41.833571 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 15 10:37:41.833636 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 15 10:37:41.833701 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 10:37:41.833772 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:37:41.833866 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 15 10:37:41.833940 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 15 10:37:41.834016 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 15 10:37:41.834106 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 10:37:41.834179 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 15 10:37:41.834246 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 15 10:37:41.834312 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 15 10:37:41.834383 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 10:37:41.834449 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 15 10:37:41.834517 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 15 10:37:41.834583 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 15 10:37:41.834649 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 15 10:37:41.834724 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 10:37:41.834838 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 10:37:41.834928 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 10:37:41.834994 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 15 10:37:41.835063 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 15 10:37:41.835149 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 10:37:41.835217 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 15 10:37:41.835226 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 10:37:41.835233 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 10:37:41.835241 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 10:37:41.835247 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 10:37:41.835256 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 10:37:41.835263 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 10:37:41.835270 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 10:37:41.835277 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 10:37:41.835283 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 10:37:41.835290 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 10:37:41.835297 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 10:37:41.835304 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 10:37:41.835310 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 10:37:41.835318 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 10:37:41.835325 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 10:37:41.835332 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 10:37:41.835339 kernel: iommu: Default domain type: Translated May 15 10:37:41.835346 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 10:37:41.835412 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 10:37:41.835479 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 10:37:41.835544 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 10:37:41.835553 kernel: vgaarb: loaded May 15 10:37:41.835562 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:37:41.835569 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:37:41.835576 kernel: PTP clock support registered May 15 10:37:41.835583 kernel: PCI: Using ACPI for IRQ routing May 15 10:37:41.835590 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 10:37:41.835596 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 10:37:41.835603 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 15 10:37:41.835610 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 10:37:41.835617 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 10:37:41.835624 kernel: clocksource: Switched to clocksource kvm-clock May 15 10:37:41.835631 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:37:41.835638 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:37:41.835654 kernel: pnp: PnP ACPI init May 15 10:37:41.835734 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 10:37:41.835745 kernel: pnp: PnP ACPI: found 6 devices May 15 10:37:41.835752 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 10:37:41.835759 kernel: NET: Registered PF_INET protocol family May 15 10:37:41.835767 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:37:41.835774 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:37:41.835781 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:37:41.835788 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:37:41.835794 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:37:41.835810 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:37:41.835817 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:37:41.835824 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:37:41.835831 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:37:41.835839 kernel: NET: Registered PF_XDP protocol family May 15 10:37:41.835910 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 10:37:41.835970 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 10:37:41.836029 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 10:37:41.836099 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 10:37:41.836161 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 10:37:41.836218 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 15 10:37:41.836227 kernel: PCI: CLS 0 bytes, default 64 May 15 10:37:41.836237 kernel: Initialise system trusted keyrings May 15 10:37:41.836244 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:37:41.836251 kernel: Key type asymmetric registered May 15 10:37:41.836257 kernel: Asymmetric key parser 'x509' registered May 15 10:37:41.836264 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:37:41.836271 kernel: io scheduler mq-deadline registered May 15 10:37:41.836278 kernel: io scheduler kyber registered May 15 10:37:41.836285 kernel: io scheduler bfq registered May 15 10:37:41.836291 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 10:37:41.836300 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 10:37:41.836307 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 10:37:41.836314 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 10:37:41.836320 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:37:41.836327 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 10:37:41.836334 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 10:37:41.836341 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 10:37:41.836348 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 10:37:41.836415 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 10:37:41.836427 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 10:37:41.836487 kernel: rtc_cmos 00:04: registered as rtc0 May 15 10:37:41.836549 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T10:37:41 UTC (1747305461) May 15 10:37:41.836610 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 10:37:41.836618 kernel: NET: Registered PF_INET6 protocol family May 15 10:37:41.836625 kernel: Segment Routing with IPv6 May 15 10:37:41.836632 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:37:41.836639 kernel: NET: Registered PF_PACKET protocol family May 15 10:37:41.836648 kernel: Key type dns_resolver registered May 15 10:37:41.836655 kernel: IPI shorthand broadcast: enabled May 15 10:37:41.836662 kernel: sched_clock: Marking stable (396162958, 101791665)->(545371080, -47416457) May 15 10:37:41.836669 kernel: registered taskstats version 1 May 15 10:37:41.836676 kernel: Loading compiled-in X.509 certificates May 15 10:37:41.836683 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 10:37:41.836690 kernel: Key type .fscrypt registered May 15 10:37:41.836696 kernel: Key type fscrypt-provisioning registered May 15 10:37:41.836703 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:37:41.836711 kernel: ima: Allocated hash algorithm: sha1 May 15 10:37:41.836718 kernel: ima: No architecture policies found May 15 10:37:41.836724 kernel: clk: Disabling unused clocks May 15 10:37:41.836731 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 10:37:41.836738 kernel: Write protecting the kernel read-only data: 28672k May 15 10:37:41.836745 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 10:37:41.836752 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 10:37:41.836759 kernel: Run /init as init process May 15 10:37:41.836765 kernel: with arguments: May 15 10:37:41.836773 kernel: /init May 15 10:37:41.836780 kernel: with environment: May 15 10:37:41.836786 kernel: HOME=/ May 15 10:37:41.836793 kernel: TERM=linux May 15 10:37:41.836811 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:37:41.836820 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:37:41.836829 systemd[1]: Detected virtualization kvm. May 15 10:37:41.836837 systemd[1]: Detected architecture x86-64. May 15 10:37:41.836845 systemd[1]: Running in initrd. May 15 10:37:41.836853 systemd[1]: No hostname configured, using default hostname. May 15 10:37:41.836860 systemd[1]: Hostname set to . May 15 10:37:41.836867 systemd[1]: Initializing machine ID from VM UUID. May 15 10:37:41.836874 systemd[1]: Queued start job for default target initrd.target. May 15 10:37:41.836882 systemd[1]: Started systemd-ask-password-console.path. May 15 10:37:41.836889 systemd[1]: Reached target cryptsetup.target. May 15 10:37:41.836896 systemd[1]: Reached target paths.target. May 15 10:37:41.836904 systemd[1]: Reached target slices.target. May 15 10:37:41.836917 systemd[1]: Reached target swap.target. May 15 10:37:41.836925 systemd[1]: Reached target timers.target. May 15 10:37:41.836933 systemd[1]: Listening on iscsid.socket. May 15 10:37:41.836941 systemd[1]: Listening on iscsiuio.socket. May 15 10:37:41.836950 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:37:41.836957 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:37:41.836965 systemd[1]: Listening on systemd-journald.socket. May 15 10:37:41.836973 systemd[1]: Listening on systemd-networkd.socket. May 15 10:37:41.836980 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:37:41.836988 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:37:41.836995 systemd[1]: Reached target sockets.target. May 15 10:37:41.837002 systemd[1]: Starting kmod-static-nodes.service... May 15 10:37:41.837010 systemd[1]: Finished network-cleanup.service. May 15 10:37:41.837019 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:37:41.837026 systemd[1]: Starting systemd-journald.service... May 15 10:37:41.837034 systemd[1]: Starting systemd-modules-load.service... May 15 10:37:41.837041 systemd[1]: Starting systemd-resolved.service... May 15 10:37:41.837049 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:37:41.837056 systemd[1]: Finished kmod-static-nodes.service. May 15 10:37:41.837064 kernel: audit: type=1130 audit(1747305461.830:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.837071 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:37:41.837079 kernel: audit: type=1130 audit(1747305461.835:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.837100 systemd-journald[198]: Journal started May 15 10:37:41.837137 systemd-journald[198]: Runtime Journal (/run/log/journal/9aebf3142da64d7cbde5b84230c6ce2f) is 6.0M, max 48.5M, 42.5M free. May 15 10:37:41.830000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.839111 systemd[1]: Started systemd-journald.service. May 15 10:37:41.839646 systemd-modules-load[199]: Inserted module 'overlay' May 15 10:37:41.880556 kernel: audit: type=1130 audit(1747305461.846:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.880579 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:37:41.880593 kernel: Bridge firewalling registered May 15 10:37:41.846000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.846741 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:37:41.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.849734 systemd-resolved[200]: Positive Trust Anchors: May 15 10:37:41.892509 kernel: audit: type=1130 audit(1747305461.882:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.892528 kernel: audit: type=1130 audit(1747305461.887:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.892545 kernel: audit: type=1130 audit(1747305461.892:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.887000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.892000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.849741 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:37:41.849767 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:37:41.851830 systemd-resolved[200]: Defaulting to hostname 'linux'. May 15 10:37:41.904382 kernel: SCSI subsystem initialized May 15 10:37:41.873016 systemd-modules-load[199]: Inserted module 'br_netfilter' May 15 10:37:41.881017 systemd[1]: Started systemd-resolved.service. May 15 10:37:41.882920 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:37:41.887286 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:37:41.892559 systemd[1]: Reached target nss-lookup.target. May 15 10:37:41.908649 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:37:41.918218 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:37:41.918257 kernel: device-mapper: uevent: version 1.0.3 May 15 10:37:41.918268 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:37:41.920808 systemd-modules-load[199]: Inserted module 'dm_multipath' May 15 10:37:41.921282 systemd[1]: Finished systemd-modules-load.service. May 15 10:37:41.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.923117 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:37:41.930314 kernel: audit: type=1130 audit(1747305461.922:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.930328 kernel: audit: type=1130 audit(1747305461.925:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.930384 systemd[1]: Starting dracut-cmdline.service... May 15 10:37:41.932126 systemd[1]: Starting systemd-sysctl.service... May 15 10:37:41.938558 dracut-cmdline[219]: dracut-dracut-053 May 15 10:37:41.939872 systemd[1]: Finished systemd-sysctl.service. May 15 10:37:41.944408 kernel: audit: type=1130 audit(1747305461.940:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:41.944454 dracut-cmdline[219]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:37:41.983117 kernel: Loading iSCSI transport class v2.0-870. May 15 10:37:41.999206 kernel: iscsi: registered transport (tcp) May 15 10:37:42.027856 kernel: iscsi: registered transport (qla4xxx) May 15 10:37:42.027971 kernel: QLogic iSCSI HBA Driver May 15 10:37:42.084602 systemd[1]: Finished dracut-cmdline.service. May 15 10:37:42.089059 systemd[1]: Starting dracut-pre-udev.service... May 15 10:37:42.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:42.145147 kernel: raid6: avx2x4 gen() 28533 MB/s May 15 10:37:42.162127 kernel: raid6: avx2x4 xor() 7110 MB/s May 15 10:37:42.179123 kernel: raid6: avx2x2 gen() 27386 MB/s May 15 10:37:42.196140 kernel: raid6: avx2x2 xor() 19042 MB/s May 15 10:37:42.213140 kernel: raid6: avx2x1 gen() 25221 MB/s May 15 10:37:42.230119 kernel: raid6: avx2x1 xor() 14720 MB/s May 15 10:37:42.247123 kernel: raid6: sse2x4 gen() 10640 MB/s May 15 10:37:42.264135 kernel: raid6: sse2x4 xor() 6685 MB/s May 15 10:37:42.281136 kernel: raid6: sse2x2 gen() 16458 MB/s May 15 10:37:42.298118 kernel: raid6: sse2x2 xor() 9479 MB/s May 15 10:37:42.315119 kernel: raid6: sse2x1 gen() 11238 MB/s May 15 10:37:42.332605 kernel: raid6: sse2x1 xor() 7067 MB/s May 15 10:37:42.332638 kernel: raid6: using algorithm avx2x4 gen() 28533 MB/s May 15 10:37:42.332652 kernel: raid6: .... xor() 7110 MB/s, rmw enabled May 15 10:37:42.333372 kernel: raid6: using avx2x2 recovery algorithm May 15 10:37:42.346116 kernel: xor: automatically using best checksumming function avx May 15 10:37:42.435126 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 10:37:42.443308 systemd[1]: Finished dracut-pre-udev.service. May 15 10:37:42.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:42.445000 audit: BPF prog-id=7 op=LOAD May 15 10:37:42.445000 audit: BPF prog-id=8 op=LOAD May 15 10:37:42.445875 systemd[1]: Starting systemd-udevd.service... May 15 10:37:42.458167 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 15 10:37:42.462046 systemd[1]: Started systemd-udevd.service. May 15 10:37:42.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:42.464369 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:37:42.475200 dracut-pre-trigger[409]: rd.md=0: removing MD RAID activation May 15 10:37:42.500338 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:37:42.501000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:42.502625 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:37:42.536953 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:37:42.538000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:42.682650 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:37:42.684879 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:37:42.684892 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:37:42.684901 kernel: GPT:9289727 != 19775487 May 15 10:37:42.684909 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:37:42.684918 kernel: GPT:9289727 != 19775487 May 15 10:37:42.684926 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:37:42.684934 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:37:42.690107 kernel: libata version 3.00 loaded. May 15 10:37:42.695115 kernel: AVX2 version of gcm_enc/dec engaged. May 15 10:37:42.695175 kernel: AES CTR mode by8 optimization enabled May 15 10:37:42.706349 kernel: ahci 0000:00:1f.2: version 3.0 May 15 10:37:42.724932 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 10:37:42.724948 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (453) May 15 10:37:42.724957 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 10:37:42.725043 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 10:37:42.725139 kernel: scsi host0: ahci May 15 10:37:42.725229 kernel: scsi host1: ahci May 15 10:37:42.725316 kernel: scsi host2: ahci May 15 10:37:42.725396 kernel: scsi host3: ahci May 15 10:37:42.725475 kernel: scsi host4: ahci May 15 10:37:42.725553 kernel: scsi host5: ahci May 15 10:37:42.725631 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 31 May 15 10:37:42.725641 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 31 May 15 10:37:42.725650 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 31 May 15 10:37:42.725658 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 31 May 15 10:37:42.725666 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 31 May 15 10:37:42.725675 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 31 May 15 10:37:42.706322 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:37:42.753496 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:37:42.754640 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:37:42.757723 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:37:42.760897 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:37:42.762373 systemd[1]: Starting disk-uuid.service... May 15 10:37:42.772222 disk-uuid[538]: Primary Header is updated. May 15 10:37:42.772222 disk-uuid[538]: Secondary Entries is updated. May 15 10:37:42.772222 disk-uuid[538]: Secondary Header is updated. May 15 10:37:42.775562 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:37:43.031597 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 10:37:43.031668 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 10:37:43.031678 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 10:37:43.033125 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 10:37:43.034119 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 10:37:43.035122 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 10:37:43.036649 kernel: ata3.00: applying bridge limits May 15 10:37:43.036660 kernel: ata3.00: configured for UDMA/100 May 15 10:37:43.037114 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 10:37:43.041123 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 10:37:43.068120 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 10:37:43.085581 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 10:37:43.085597 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 10:37:43.781537 disk-uuid[539]: The operation has completed successfully. May 15 10:37:43.782751 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:37:43.800117 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:37:43.800206 systemd[1]: Finished disk-uuid.service. May 15 10:37:43.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:43.802000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:43.814124 systemd[1]: Starting verity-setup.service... May 15 10:37:43.826126 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 10:37:43.842533 systemd[1]: Found device dev-mapper-usr.device. May 15 10:37:43.845651 systemd[1]: Mounting sysusr-usr.mount... May 15 10:37:43.847360 systemd[1]: Finished verity-setup.service. May 15 10:37:43.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:43.906907 systemd[1]: Mounted sysusr-usr.mount. May 15 10:37:43.908368 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:37:43.908407 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:37:43.910301 systemd[1]: Starting ignition-setup.service... May 15 10:37:43.912223 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:37:43.918323 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:37:43.918357 kernel: BTRFS info (device vda6): using free space tree May 15 10:37:43.918370 kernel: BTRFS info (device vda6): has skinny extents May 15 10:37:43.925638 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:37:43.933996 systemd[1]: Finished ignition-setup.service. May 15 10:37:43.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:43.934832 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:37:43.968779 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:37:43.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:43.971261 ignition[649]: Ignition 2.14.0 May 15 10:37:43.970000 audit: BPF prog-id=9 op=LOAD May 15 10:37:43.971271 ignition[649]: Stage: fetch-offline May 15 10:37:43.971288 systemd[1]: Starting systemd-networkd.service... May 15 10:37:43.971309 ignition[649]: no configs at "/usr/lib/ignition/base.d" May 15 10:37:43.971316 ignition[649]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:37:43.971398 ignition[649]: parsed url from cmdline: "" May 15 10:37:43.971401 ignition[649]: no config URL provided May 15 10:37:43.971405 ignition[649]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:37:43.971410 ignition[649]: no config at "/usr/lib/ignition/user.ign" May 15 10:37:43.971425 ignition[649]: op(1): [started] loading QEMU firmware config module May 15 10:37:43.971430 ignition[649]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:37:43.974618 ignition[649]: op(1): [finished] loading QEMU firmware config module May 15 10:37:44.019810 ignition[649]: parsing config with SHA512: a147923bc6583b3dce97129f9c754809f51c4a7d5b5ac1ddedfbe8bf84e0a58712701200c5b736691d765f5d852e9bc6f8d650aa8c2592a2be68e89a33fd9eb0 May 15 10:37:44.026976 unknown[649]: fetched base config from "system" May 15 10:37:44.026996 unknown[649]: fetched user config from "qemu" May 15 10:37:44.027524 ignition[649]: fetch-offline: fetch-offline passed May 15 10:37:44.028000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.028517 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:37:44.027583 ignition[649]: Ignition finished successfully May 15 10:37:44.043349 systemd-networkd[720]: lo: Link UP May 15 10:37:44.043357 systemd-networkd[720]: lo: Gained carrier May 15 10:37:44.044981 systemd-networkd[720]: Enumeration completed May 15 10:37:44.045069 systemd[1]: Started systemd-networkd.service. May 15 10:37:44.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.045862 systemd[1]: Reached target network.target. May 15 10:37:44.048171 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:37:44.048893 systemd[1]: Starting ignition-kargs.service... May 15 10:37:44.050322 systemd[1]: Starting iscsiuio.service... May 15 10:37:44.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.053947 systemd[1]: Started iscsiuio.service. May 15 10:37:44.055928 systemd[1]: Starting iscsid.service... May 15 10:37:44.058301 systemd-networkd[720]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:37:44.059693 systemd[1]: Started iscsid.service. May 15 10:37:44.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.060216 ignition[724]: Ignition 2.14.0 May 15 10:37:44.064031 iscsid[734]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:37:44.064031 iscsid[734]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:37:44.064031 iscsid[734]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:37:44.064031 iscsid[734]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:37:44.064031 iscsid[734]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:37:44.064031 iscsid[734]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:37:44.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.061564 systemd[1]: Starting dracut-initqueue.service... May 15 10:37:44.060222 ignition[724]: Stage: kargs May 15 10:37:44.062638 systemd[1]: Finished ignition-kargs.service. May 15 10:37:44.060325 ignition[724]: no configs at "/usr/lib/ignition/base.d" May 15 10:37:44.064695 systemd[1]: Starting ignition-disks.service... May 15 10:37:44.060335 ignition[724]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:37:44.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.070801 systemd[1]: Finished dracut-initqueue.service. May 15 10:37:44.061398 ignition[724]: kargs: kargs passed May 15 10:37:44.073237 systemd-networkd[720]: eth0: Link UP May 15 10:37:44.061442 ignition[724]: Ignition finished successfully May 15 10:37:44.073240 systemd-networkd[720]: eth0: Gained carrier May 15 10:37:44.071560 ignition[736]: Ignition 2.14.0 May 15 10:37:44.075441 systemd[1]: Finished ignition-disks.service. May 15 10:37:44.071567 ignition[736]: Stage: disks May 15 10:37:44.077280 systemd[1]: Reached target initrd-root-device.target. May 15 10:37:44.071660 ignition[736]: no configs at "/usr/lib/ignition/base.d" May 15 10:37:44.081199 systemd[1]: Reached target local-fs-pre.target. May 15 10:37:44.071670 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:37:44.107427 systemd-fsck[755]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 15 10:37:44.082021 systemd[1]: Reached target local-fs.target. May 15 10:37:44.072919 ignition[736]: disks: disks passed May 15 10:37:44.082815 systemd[1]: Reached target remote-fs-pre.target. May 15 10:37:44.072960 ignition[736]: Ignition finished successfully May 15 10:37:44.082861 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:37:44.083028 systemd[1]: Reached target remote-fs.target. May 15 10:37:44.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.083368 systemd[1]: Reached target sysinit.target. May 15 10:37:44.083530 systemd[1]: Reached target basic.target. May 15 10:37:44.084513 systemd[1]: Starting dracut-pre-mount.service... May 15 10:37:44.090147 systemd-networkd[720]: eth0: DHCPv4 address 10.0.0.44/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:37:44.092711 systemd[1]: Finished dracut-pre-mount.service. May 15 10:37:44.094135 systemd[1]: Starting systemd-fsck-root.service... May 15 10:37:44.125344 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:37:44.112479 systemd[1]: Finished systemd-fsck-root.service. May 15 10:37:44.115034 systemd[1]: Mounting sysroot.mount... May 15 10:37:44.124087 systemd[1]: Mounted sysroot.mount. May 15 10:37:44.125377 systemd[1]: Reached target initrd-root-fs.target. May 15 10:37:44.127636 systemd[1]: Mounting sysroot-usr.mount... May 15 10:37:44.128833 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:37:44.128860 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:37:44.128877 systemd[1]: Reached target ignition-diskful.target. May 15 10:37:44.138276 initrd-setup-root[765]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:37:44.130904 systemd[1]: Mounted sysroot-usr.mount. May 15 10:37:44.140496 initrd-setup-root[773]: cut: /sysroot/etc/group: No such file or directory May 15 10:37:44.132317 systemd[1]: Starting initrd-setup-root.service... May 15 10:37:44.142908 initrd-setup-root[781]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:37:44.144315 initrd-setup-root[789]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:37:44.165271 systemd[1]: Finished initrd-setup-root.service. May 15 10:37:44.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.167700 systemd[1]: Starting ignition-mount.service... May 15 10:37:44.170287 systemd[1]: Starting sysroot-boot.service... May 15 10:37:44.173187 bash[806]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:37:44.182362 ignition[808]: INFO : Ignition 2.14.0 May 15 10:37:44.182362 ignition[808]: INFO : Stage: mount May 15 10:37:44.184314 ignition[808]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:37:44.184314 ignition[808]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:37:44.184314 ignition[808]: INFO : mount: mount passed May 15 10:37:44.184314 ignition[808]: INFO : Ignition finished successfully May 15 10:37:44.189044 systemd[1]: Finished ignition-mount.service. May 15 10:37:44.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.191358 systemd[1]: Finished sysroot-boot.service. May 15 10:37:44.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:44.853344 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:37:44.860136 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (816) May 15 10:37:44.860180 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:37:44.861560 kernel: BTRFS info (device vda6): using free space tree May 15 10:37:44.861582 kernel: BTRFS info (device vda6): has skinny extents May 15 10:37:44.865660 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:37:44.867367 systemd[1]: Starting ignition-files.service... May 15 10:37:44.882683 ignition[836]: INFO : Ignition 2.14.0 May 15 10:37:44.882683 ignition[836]: INFO : Stage: files May 15 10:37:44.884705 ignition[836]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:37:44.884705 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:37:44.884705 ignition[836]: DEBUG : files: compiled without relabeling support, skipping May 15 10:37:44.888491 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:37:44.888491 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:37:44.891324 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:37:44.891324 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:37:44.894188 unknown[836]: wrote ssh authorized keys file for user: core May 15 10:37:44.895214 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:37:44.896611 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 10:37:44.898721 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 10:37:44.937838 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:37:45.084250 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 10:37:45.084250 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:37:45.088194 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.30.1-x86-64.raw: attempt #1 May 15 10:37:45.421282 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:37:45.720364 systemd-networkd[720]: eth0: Gained IPv6LL May 15 10:37:45.963798 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.30.1-x86-64.raw" May 15 10:37:45.963798 ignition[836]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:37:45.969395 ignition[836]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:37:46.000370 ignition[836]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:37:46.000370 ignition[836]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:37:46.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.005633 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:37:46.005633 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:37:46.005633 ignition[836]: INFO : files: files passed May 15 10:37:46.005633 ignition[836]: INFO : Ignition finished successfully May 15 10:37:46.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.001689 systemd[1]: Finished ignition-files.service. May 15 10:37:46.003889 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:37:46.017926 initrd-setup-root-after-ignition[861]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:37:46.005578 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:37:46.021371 initrd-setup-root-after-ignition[863]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:37:46.006223 systemd[1]: Starting ignition-quench.service... May 15 10:37:46.008742 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:37:46.008810 systemd[1]: Finished ignition-quench.service. May 15 10:37:46.011698 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:37:46.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.026000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.013454 systemd[1]: Reached target ignition-complete.target. May 15 10:37:46.015635 systemd[1]: Starting initrd-parse-etc.service... May 15 10:37:46.025878 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:37:46.025955 systemd[1]: Finished initrd-parse-etc.service. May 15 10:37:46.026929 systemd[1]: Reached target initrd-fs.target. May 15 10:37:46.028539 systemd[1]: Reached target initrd.target. May 15 10:37:46.029330 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:37:46.029875 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:37:46.038033 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:37:46.038000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.039568 systemd[1]: Starting initrd-cleanup.service... May 15 10:37:46.048130 systemd[1]: Stopped target nss-lookup.target. May 15 10:37:46.049074 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:37:46.050672 systemd[1]: Stopped target timers.target. May 15 10:37:46.052270 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:37:46.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.052383 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:37:46.053891 systemd[1]: Stopped target initrd.target. May 15 10:37:46.055482 systemd[1]: Stopped target basic.target. May 15 10:37:46.057185 systemd[1]: Stopped target ignition-complete.target. May 15 10:37:46.059065 systemd[1]: Stopped target ignition-diskful.target. May 15 10:37:46.060680 systemd[1]: Stopped target initrd-root-device.target. May 15 10:37:46.062411 systemd[1]: Stopped target remote-fs.target. May 15 10:37:46.064268 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:37:46.066252 systemd[1]: Stopped target sysinit.target. May 15 10:37:46.067895 systemd[1]: Stopped target local-fs.target. May 15 10:37:46.069550 systemd[1]: Stopped target local-fs-pre.target. May 15 10:37:46.071075 systemd[1]: Stopped target swap.target. May 15 10:37:46.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.072508 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:37:46.072621 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:37:46.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.074191 systemd[1]: Stopped target cryptsetup.target. May 15 10:37:46.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.075572 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:37:46.075680 systemd[1]: Stopped dracut-initqueue.service. May 15 10:37:46.077443 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:37:46.077546 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:37:46.079083 systemd[1]: Stopped target paths.target. May 15 10:37:46.080494 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:37:46.084137 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:37:46.085200 systemd[1]: Stopped target slices.target. May 15 10:37:46.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.086744 systemd[1]: Stopped target sockets.target. May 15 10:37:46.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.088666 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:37:46.095341 iscsid[734]: iscsid shutting down. May 15 10:37:46.096000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.088788 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:37:46.090549 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:37:46.099945 ignition[876]: INFO : Ignition 2.14.0 May 15 10:37:46.099945 ignition[876]: INFO : Stage: umount May 15 10:37:46.099945 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:37:46.099945 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:37:46.099945 ignition[876]: INFO : umount: umount passed May 15 10:37:46.099945 ignition[876]: INFO : Ignition finished successfully May 15 10:37:46.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.103000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.090647 systemd[1]: Stopped ignition-files.service. May 15 10:37:46.112000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.092643 systemd[1]: Stopping ignition-mount.service... May 15 10:37:46.093549 systemd[1]: Stopping iscsid.service... May 15 10:37:46.095269 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:37:46.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.095441 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:37:46.098357 systemd[1]: Stopping sysroot-boot.service... May 15 10:37:46.099935 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:37:46.100067 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:37:46.101920 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:37:46.102032 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:37:46.105365 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:37:46.105439 systemd[1]: Stopped iscsid.service. May 15 10:37:46.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.107130 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:37:46.107207 systemd[1]: Stopped ignition-mount.service. May 15 10:37:46.109075 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:37:46.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.109200 systemd[1]: Closed iscsid.socket. May 15 10:37:46.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.110451 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:37:46.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.110491 systemd[1]: Stopped ignition-disks.service. May 15 10:37:46.111564 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:37:46.111604 systemd[1]: Stopped ignition-kargs.service. May 15 10:37:46.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.112648 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:37:46.148000 audit: BPF prog-id=6 op=UNLOAD May 15 10:37:46.112687 systemd[1]: Stopped ignition-setup.service. May 15 10:37:46.114438 systemd[1]: Stopping iscsiuio.service... May 15 10:37:46.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.116983 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:37:46.117560 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:37:46.117652 systemd[1]: Finished initrd-cleanup.service. May 15 10:37:46.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.118748 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:37:46.118827 systemd[1]: Stopped iscsiuio.service. May 15 10:37:46.121362 systemd[1]: Stopped target network.target. May 15 10:37:46.122174 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:37:46.122206 systemd[1]: Closed iscsiuio.socket. May 15 10:37:46.123681 systemd[1]: Stopping systemd-networkd.service... May 15 10:37:46.125523 systemd[1]: Stopping systemd-resolved.service... May 15 10:37:46.128148 systemd-networkd[720]: eth0: DHCPv6 lease lost May 15 10:37:46.129036 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:37:46.129131 systemd[1]: Stopped systemd-networkd.service. May 15 10:37:46.131718 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:37:46.131748 systemd[1]: Closed systemd-networkd.socket. May 15 10:37:46.134407 systemd[1]: Stopping network-cleanup.service... May 15 10:37:46.135805 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:37:46.135850 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:37:46.138085 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:37:46.138140 systemd[1]: Stopped systemd-sysctl.service. May 15 10:37:46.139736 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:37:46.139767 systemd[1]: Stopped systemd-modules-load.service. May 15 10:37:46.139892 systemd[1]: Stopping systemd-udevd.service... May 15 10:37:46.141874 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:37:46.142239 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:37:46.142306 systemd[1]: Stopped systemd-resolved.service. May 15 10:37:46.145883 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:37:46.145963 systemd[1]: Stopped network-cleanup.service. May 15 10:37:46.148542 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:37:46.148636 systemd[1]: Stopped systemd-udevd.service. May 15 10:37:46.150870 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:37:46.150900 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:37:46.152967 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:37:46.152991 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:37:46.155042 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:37:46.155071 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:37:46.156958 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:37:46.157955 systemd[1]: Stopped dracut-cmdline.service. May 15 10:37:46.166000 audit: BPF prog-id=9 op=UNLOAD May 15 10:37:46.188000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.188562 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:37:46.188636 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:37:46.191000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.192442 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:37:46.194594 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:37:46.194648 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:37:46.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.198370 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:37:46.199471 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:37:46.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.201477 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:37:46.202418 systemd[1]: Stopped sysroot-boot.service. May 15 10:37:46.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.203972 systemd[1]: Reached target initrd-switch-root.target. May 15 10:37:46.205721 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:37:46.206712 systemd[1]: Stopped initrd-setup-root.service. May 15 10:37:46.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.208866 systemd[1]: Starting initrd-switch-root.service... May 15 10:37:46.213536 kernel: kauditd_printk_skb: 65 callbacks suppressed May 15 10:37:46.213554 kernel: audit: type=1131 audit(1747305466.208:76): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:46.226535 systemd[1]: Switching root. May 15 10:37:46.246182 systemd-journald[198]: Journal stopped May 15 10:37:49.262572 systemd-journald[198]: Received SIGTERM from PID 1 (systemd). May 15 10:37:49.262621 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:37:49.262634 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:37:49.262654 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:37:49.262663 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:37:49.262673 kernel: SELinux: policy capability open_perms=1 May 15 10:37:49.262685 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:37:49.262694 kernel: SELinux: policy capability always_check_network=0 May 15 10:37:49.262703 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:37:49.262712 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:37:49.262721 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:37:49.262734 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:37:49.262743 kernel: audit: type=1403 audit(1747305466.310:77): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:37:49.262757 systemd[1]: Successfully loaded SELinux policy in 42.586ms. May 15 10:37:49.262774 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.832ms. May 15 10:37:49.262785 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:37:49.262795 systemd[1]: Detected virtualization kvm. May 15 10:37:49.262806 systemd[1]: Detected architecture x86-64. May 15 10:37:49.262816 systemd[1]: Detected first boot. May 15 10:37:49.262826 systemd[1]: Initializing machine ID from VM UUID. May 15 10:37:49.262836 kernel: audit: type=1400 audit(1747305466.782:78): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:37:49.262848 kernel: audit: type=1400 audit(1747305466.782:79): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:37:49.262857 kernel: audit: type=1334 audit(1747305466.788:80): prog-id=10 op=LOAD May 15 10:37:49.262866 kernel: audit: type=1334 audit(1747305466.788:81): prog-id=10 op=UNLOAD May 15 10:37:49.262876 kernel: audit: type=1334 audit(1747305466.790:82): prog-id=11 op=LOAD May 15 10:37:49.262885 kernel: audit: type=1334 audit(1747305466.790:83): prog-id=11 op=UNLOAD May 15 10:37:49.262894 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:37:49.262904 kernel: audit: type=1400 audit(1747305466.821:84): avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:37:49.262915 kernel: audit: type=1300 audit(1747305466.821:84): arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:49.262926 systemd[1]: Populated /etc with preset unit settings. May 15 10:37:49.262937 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:37:49.262948 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:37:49.262959 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:37:49.262969 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:37:49.262980 systemd[1]: Stopped initrd-switch-root.service. May 15 10:37:49.262990 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:37:49.263001 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:37:49.263011 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:37:49.263021 systemd[1]: Created slice system-getty.slice. May 15 10:37:49.263031 systemd[1]: Created slice system-modprobe.slice. May 15 10:37:49.263041 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:37:49.263053 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:37:49.263066 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:37:49.263077 systemd[1]: Created slice user.slice. May 15 10:37:49.263107 systemd[1]: Started systemd-ask-password-console.path. May 15 10:37:49.263123 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:37:49.263136 systemd[1]: Set up automount boot.automount. May 15 10:37:49.263149 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:37:49.263161 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:37:49.263171 systemd[1]: Stopped target initrd-fs.target. May 15 10:37:49.263181 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:37:49.263191 systemd[1]: Reached target integritysetup.target. May 15 10:37:49.263201 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:37:49.263211 systemd[1]: Reached target remote-fs.target. May 15 10:37:49.263221 systemd[1]: Reached target slices.target. May 15 10:37:49.263233 systemd[1]: Reached target swap.target. May 15 10:37:49.263243 systemd[1]: Reached target torcx.target. May 15 10:37:49.263253 systemd[1]: Reached target veritysetup.target. May 15 10:37:49.263264 systemd[1]: Listening on systemd-coredump.socket. May 15 10:37:49.263274 systemd[1]: Listening on systemd-initctl.socket. May 15 10:37:49.263284 systemd[1]: Listening on systemd-networkd.socket. May 15 10:37:49.263294 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:37:49.263304 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:37:49.263314 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:37:49.263324 systemd[1]: Mounting dev-hugepages.mount... May 15 10:37:49.263334 systemd[1]: Mounting dev-mqueue.mount... May 15 10:37:49.263344 systemd[1]: Mounting media.mount... May 15 10:37:49.263356 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:49.263366 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:37:49.263376 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:37:49.263386 systemd[1]: Mounting tmp.mount... May 15 10:37:49.263396 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:37:49.263406 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:37:49.263416 systemd[1]: Starting kmod-static-nodes.service... May 15 10:37:49.263426 systemd[1]: Starting modprobe@configfs.service... May 15 10:37:49.263435 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:37:49.263446 systemd[1]: Starting modprobe@drm.service... May 15 10:37:49.263458 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:37:49.263468 systemd[1]: Starting modprobe@fuse.service... May 15 10:37:49.263479 systemd[1]: Starting modprobe@loop.service... May 15 10:37:49.263489 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:37:49.263499 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:37:49.263509 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:37:49.263519 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:37:49.263529 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:37:49.263540 kernel: loop: module loaded May 15 10:37:49.263549 kernel: fuse: init (API version 7.34) May 15 10:37:49.263559 systemd[1]: Stopped systemd-journald.service. May 15 10:37:49.263568 systemd[1]: Starting systemd-journald.service... May 15 10:37:49.263578 systemd[1]: Starting systemd-modules-load.service... May 15 10:37:49.263588 systemd[1]: Starting systemd-network-generator.service... May 15 10:37:49.263598 systemd[1]: Starting systemd-remount-fs.service... May 15 10:37:49.263608 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:37:49.263618 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:37:49.263630 systemd[1]: Stopped verity-setup.service. May 15 10:37:49.263648 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:49.263658 systemd[1]: Mounted dev-hugepages.mount. May 15 10:37:49.263668 systemd[1]: Mounted dev-mqueue.mount. May 15 10:37:49.263680 systemd-journald[991]: Journal started May 15 10:37:49.263716 systemd-journald[991]: Runtime Journal (/run/log/journal/9aebf3142da64d7cbde5b84230c6ce2f) is 6.0M, max 48.5M, 42.5M free. May 15 10:37:46.310000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:37:46.782000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:37:46.782000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:37:46.788000 audit: BPF prog-id=10 op=LOAD May 15 10:37:46.788000 audit: BPF prog-id=10 op=UNLOAD May 15 10:37:46.790000 audit: BPF prog-id=11 op=LOAD May 15 10:37:46.790000 audit: BPF prog-id=11 op=UNLOAD May 15 10:37:46.821000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:37:46.821000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001878d2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:46.821000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:37:46.823000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:37:46.823000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001879a9 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:46.823000 audit: CWD cwd="/" May 15 10:37:46.823000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:46.823000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:46.823000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:37:49.126000 audit: BPF prog-id=12 op=LOAD May 15 10:37:49.126000 audit: BPF prog-id=3 op=UNLOAD May 15 10:37:49.126000 audit: BPF prog-id=13 op=LOAD May 15 10:37:49.126000 audit: BPF prog-id=14 op=LOAD May 15 10:37:49.126000 audit: BPF prog-id=4 op=UNLOAD May 15 10:37:49.126000 audit: BPF prog-id=5 op=UNLOAD May 15 10:37:49.127000 audit: BPF prog-id=15 op=LOAD May 15 10:37:49.127000 audit: BPF prog-id=12 op=UNLOAD May 15 10:37:49.127000 audit: BPF prog-id=16 op=LOAD May 15 10:37:49.127000 audit: BPF prog-id=17 op=LOAD May 15 10:37:49.127000 audit: BPF prog-id=13 op=UNLOAD May 15 10:37:49.127000 audit: BPF prog-id=14 op=UNLOAD May 15 10:37:49.128000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.131000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.140000 audit: BPF prog-id=15 op=UNLOAD May 15 10:37:49.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.240000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.241000 audit: BPF prog-id=18 op=LOAD May 15 10:37:49.241000 audit: BPF prog-id=19 op=LOAD May 15 10:37:49.241000 audit: BPF prog-id=20 op=LOAD May 15 10:37:49.241000 audit: BPF prog-id=16 op=UNLOAD May 15 10:37:49.241000 audit: BPF prog-id=17 op=UNLOAD May 15 10:37:49.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.261000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:37:49.261000 audit[991]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd233ac070 a2=4000 a3=7ffd233ac10c items=0 ppid=1 pid=991 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:49.261000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:37:49.124921 systemd[1]: Queued start job for default target multi-user.target. May 15 10:37:46.819801 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:37:49.124932 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:37:46.820029 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:37:49.127950 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:37:46.820049 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:37:46.820080 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:37:46.820105 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:37:46.820138 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:37:46.820152 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:37:46.820348 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:37:46.820377 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:37:46.820387 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:37:46.820713 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:37:46.820751 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:37:46.820770 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:37:46.820786 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:37:46.820805 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:37:46.820822 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:46Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:37:48.844882 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:37:48.845171 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:37:48.845268 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:37:48.845409 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:37:48.845453 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:37:48.845504 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:37:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:37:49.266549 systemd[1]: Started systemd-journald.service. May 15 10:37:49.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.267127 systemd[1]: Mounted media.mount. May 15 10:37:49.268036 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:37:49.269107 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:37:49.270120 systemd[1]: Mounted tmp.mount. May 15 10:37:49.271034 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:37:49.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.272144 systemd[1]: Finished kmod-static-nodes.service. May 15 10:37:49.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.273204 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:37:49.273317 systemd[1]: Finished modprobe@configfs.service. May 15 10:37:49.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.274393 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:37:49.274492 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:37:49.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.275538 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:37:49.275650 systemd[1]: Finished modprobe@drm.service. May 15 10:37:49.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.276000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.276726 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:37:49.276833 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:37:49.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.278013 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:37:49.278130 systemd[1]: Finished modprobe@fuse.service. May 15 10:37:49.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.278000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.279140 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:37:49.279245 systemd[1]: Finished modprobe@loop.service. May 15 10:37:49.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.279000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.280331 systemd[1]: Finished systemd-modules-load.service. May 15 10:37:49.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.281505 systemd[1]: Finished systemd-network-generator.service. May 15 10:37:49.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.282664 systemd[1]: Finished systemd-remount-fs.service. May 15 10:37:49.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.283937 systemd[1]: Reached target network-pre.target. May 15 10:37:49.285747 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:37:49.287394 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:37:49.288285 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:37:49.289312 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:37:49.291232 systemd[1]: Starting systemd-journal-flush.service... May 15 10:37:49.292343 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:37:49.293161 systemd[1]: Starting systemd-random-seed.service... May 15 10:37:49.294132 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:37:49.295800 systemd-journald[991]: Time spent on flushing to /var/log/journal/9aebf3142da64d7cbde5b84230c6ce2f is 16.376ms for 1095 entries. May 15 10:37:49.295800 systemd-journald[991]: System Journal (/var/log/journal/9aebf3142da64d7cbde5b84230c6ce2f) is 8.0M, max 195.6M, 187.6M free. May 15 10:37:49.329408 systemd-journald[991]: Received client request to flush runtime journal. May 15 10:37:49.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.309000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.294961 systemd[1]: Starting systemd-sysctl.service... May 15 10:37:49.299016 systemd[1]: Starting systemd-sysusers.service... May 15 10:37:49.302654 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:37:49.304288 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:37:49.330796 udevadm[1014]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:37:49.306307 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:37:49.308030 systemd[1]: Finished systemd-random-seed.service. May 15 10:37:49.309770 systemd[1]: Reached target first-boot-complete.target. May 15 10:37:49.312521 systemd[1]: Starting systemd-udev-settle.service... May 15 10:37:49.313996 systemd[1]: Finished systemd-sysctl.service. May 15 10:37:49.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.315346 systemd[1]: Finished systemd-sysusers.service. May 15 10:37:49.330200 systemd[1]: Finished systemd-journal-flush.service. May 15 10:37:49.726740 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:37:49.727000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.728000 audit: BPF prog-id=21 op=LOAD May 15 10:37:49.728000 audit: BPF prog-id=22 op=LOAD May 15 10:37:49.728000 audit: BPF prog-id=7 op=UNLOAD May 15 10:37:49.728000 audit: BPF prog-id=8 op=UNLOAD May 15 10:37:49.729034 systemd[1]: Starting systemd-udevd.service... May 15 10:37:49.744511 systemd-udevd[1016]: Using default interface naming scheme 'v252'. May 15 10:37:49.757046 systemd[1]: Started systemd-udevd.service. May 15 10:37:49.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.762000 audit: BPF prog-id=23 op=LOAD May 15 10:37:49.763638 systemd[1]: Starting systemd-networkd.service... May 15 10:37:49.771000 audit: BPF prog-id=24 op=LOAD May 15 10:37:49.771000 audit: BPF prog-id=25 op=LOAD May 15 10:37:49.771000 audit: BPF prog-id=26 op=LOAD May 15 10:37:49.772691 systemd[1]: Starting systemd-userdbd.service... May 15 10:37:49.778534 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 10:37:49.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.797992 systemd[1]: Started systemd-userdbd.service. May 15 10:37:49.805344 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:37:49.825119 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 10:37:49.830126 kernel: ACPI: button: Power Button [PWRF] May 15 10:37:49.838715 systemd-networkd[1035]: lo: Link UP May 15 10:37:49.838728 systemd-networkd[1035]: lo: Gained carrier May 15 10:37:49.839192 systemd-networkd[1035]: Enumeration completed May 15 10:37:49.839271 systemd[1]: Started systemd-networkd.service. May 15 10:37:49.839418 systemd-networkd[1035]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:37:49.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.840937 systemd-networkd[1035]: eth0: Link UP May 15 10:37:49.840948 systemd-networkd[1035]: eth0: Gained carrier May 15 10:37:49.840000 audit[1027]: AVC avc: denied { confidentiality } for pid=1027 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 10:37:49.840000 audit[1027]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=563d49e32a80 a1=338ac a2=7f9041d42bc5 a3=5 items=110 ppid=1016 pid=1027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:49.840000 audit: CWD cwd="/" May 15 10:37:49.840000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=1 name=(null) inode=13961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=2 name=(null) inode=13961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=3 name=(null) inode=13962 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=4 name=(null) inode=13961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=5 name=(null) inode=13963 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=6 name=(null) inode=13961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=7 name=(null) inode=13964 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=8 name=(null) inode=13964 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=9 name=(null) inode=13965 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=10 name=(null) inode=13964 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=11 name=(null) inode=13966 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=12 name=(null) inode=13964 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=13 name=(null) inode=13967 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=14 name=(null) inode=13964 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=15 name=(null) inode=13968 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=16 name=(null) inode=13964 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=17 name=(null) inode=13969 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=18 name=(null) inode=13961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=19 name=(null) inode=13970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=20 name=(null) inode=13970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=21 name=(null) inode=13971 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=22 name=(null) inode=13970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=23 name=(null) inode=13972 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=24 name=(null) inode=13970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=25 name=(null) inode=13973 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=26 name=(null) inode=13970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=27 name=(null) inode=13974 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=28 name=(null) inode=13970 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=29 name=(null) inode=13975 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=30 name=(null) inode=13961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=31 name=(null) inode=13976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=32 name=(null) inode=13976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=33 name=(null) inode=13977 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=34 name=(null) inode=13976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=35 name=(null) inode=13978 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=36 name=(null) inode=13976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=37 name=(null) inode=13979 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=38 name=(null) inode=13976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=39 name=(null) inode=13980 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=40 name=(null) inode=13976 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=41 name=(null) inode=13981 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=42 name=(null) inode=13961 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=43 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=44 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=45 name=(null) inode=13983 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=46 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=47 name=(null) inode=13984 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=48 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=49 name=(null) inode=13985 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=50 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=51 name=(null) inode=13986 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=52 name=(null) inode=13982 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=53 name=(null) inode=13987 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=55 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=56 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=57 name=(null) inode=13989 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=58 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=59 name=(null) inode=13990 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=60 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=61 name=(null) inode=13991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=62 name=(null) inode=13991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=63 name=(null) inode=13992 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=64 name=(null) inode=13991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=65 name=(null) inode=13993 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=66 name=(null) inode=13991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=67 name=(null) inode=13994 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=68 name=(null) inode=13991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=69 name=(null) inode=13995 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=70 name=(null) inode=13991 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=71 name=(null) inode=13996 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=72 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=73 name=(null) inode=13997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=74 name=(null) inode=13997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=75 name=(null) inode=13998 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=76 name=(null) inode=13997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=77 name=(null) inode=13999 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=78 name=(null) inode=13997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=79 name=(null) inode=14000 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=80 name=(null) inode=13997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=81 name=(null) inode=14001 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=82 name=(null) inode=13997 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=83 name=(null) inode=14002 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=84 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=85 name=(null) inode=14003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=86 name=(null) inode=14003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=87 name=(null) inode=14004 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=88 name=(null) inode=14003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=89 name=(null) inode=14005 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=90 name=(null) inode=14003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=91 name=(null) inode=14006 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=92 name=(null) inode=14003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=93 name=(null) inode=14007 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=94 name=(null) inode=14003 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=95 name=(null) inode=14008 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=96 name=(null) inode=13988 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=97 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=98 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=99 name=(null) inode=14010 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=100 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=101 name=(null) inode=14011 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=102 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=103 name=(null) inode=14012 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=104 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=105 name=(null) inode=14013 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=106 name=(null) inode=14009 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=107 name=(null) inode=14014 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PATH item=109 name=(null) inode=14015 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:37:49.840000 audit: PROCTITLE proctitle="(udev-worker)" May 15 10:37:49.853288 systemd-networkd[1035]: eth0: DHCPv4 address 10.0.0.44/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:37:49.873141 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 10:37:49.879112 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 10:37:49.892564 kernel: mousedev: PS/2 mouse device common for all mice May 15 10:37:49.892582 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 10:37:49.892715 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 10:37:49.925124 kernel: kvm: Nested Virtualization enabled May 15 10:37:49.925200 kernel: SVM: kvm: Nested Paging enabled May 15 10:37:49.925214 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 10:37:49.925247 kernel: SVM: Virtual GIF supported May 15 10:37:49.943109 kernel: EDAC MC: Ver: 3.0.0 May 15 10:37:49.969463 systemd[1]: Finished systemd-udev-settle.service. May 15 10:37:49.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:49.971639 systemd[1]: Starting lvm2-activation-early.service... May 15 10:37:49.979818 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:37:50.008247 systemd[1]: Finished lvm2-activation-early.service. May 15 10:37:50.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.009381 systemd[1]: Reached target cryptsetup.target. May 15 10:37:50.011289 systemd[1]: Starting lvm2-activation.service... May 15 10:37:50.014915 lvm[1052]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:37:50.039039 systemd[1]: Finished lvm2-activation.service. May 15 10:37:50.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.040044 systemd[1]: Reached target local-fs-pre.target. May 15 10:37:50.040890 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:37:50.040917 systemd[1]: Reached target local-fs.target. May 15 10:37:50.041760 systemd[1]: Reached target machines.target. May 15 10:37:50.043604 systemd[1]: Starting ldconfig.service... May 15 10:37:50.044642 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:37:50.044688 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:37:50.045518 systemd[1]: Starting systemd-boot-update.service... May 15 10:37:50.047028 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:37:50.048981 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:37:50.050835 systemd[1]: Starting systemd-sysext.service... May 15 10:37:50.053001 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1054 (bootctl) May 15 10:37:50.054255 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:37:50.059138 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:37:50.060000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.064387 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:37:50.068840 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:37:50.069021 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:37:50.079131 kernel: loop0: detected capacity change from 0 to 210664 May 15 10:37:50.091003 systemd-fsck[1062]: fsck.fat 4.2 (2021-01-31) May 15 10:37:50.091003 systemd-fsck[1062]: /dev/vda1: 790 files, 120732/258078 clusters May 15 10:37:50.092317 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:37:50.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.094699 systemd[1]: Mounting boot.mount... May 15 10:37:50.302331 systemd[1]: Mounted boot.mount. May 15 10:37:50.311140 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:37:50.315517 systemd[1]: Finished systemd-boot-update.service. May 15 10:37:50.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.319073 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:37:50.319538 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:37:50.320000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.328114 kernel: loop1: detected capacity change from 0 to 210664 May 15 10:37:50.332777 (sd-sysext)[1067]: Using extensions 'kubernetes'. May 15 10:37:50.333070 (sd-sysext)[1067]: Merged extensions into '/usr'. May 15 10:37:50.347169 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:50.348375 systemd[1]: Mounting usr-share-oem.mount... May 15 10:37:50.349262 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:37:50.350303 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:37:50.352033 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:37:50.353686 systemd[1]: Starting modprobe@loop.service... May 15 10:37:50.354465 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:37:50.354587 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:37:50.354712 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:50.357166 systemd[1]: Mounted usr-share-oem.mount. May 15 10:37:50.358269 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:37:50.358382 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:37:50.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.359625 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:37:50.359720 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:37:50.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.361077 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:37:50.361190 systemd[1]: Finished modprobe@loop.service. May 15 10:37:50.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.362561 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:37:50.362658 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:37:50.363522 systemd[1]: Finished systemd-sysext.service. May 15 10:37:50.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.365370 systemd[1]: Starting ensure-sysext.service... May 15 10:37:50.366971 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:37:50.372671 systemd[1]: Reloading. May 15 10:37:50.378838 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:37:50.380528 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:37:50.383376 systemd-tmpfiles[1074]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:37:50.384886 ldconfig[1053]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:37:50.424522 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-15T10:37:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:37:50.424867 /usr/lib/systemd/system-generators/torcx-generator[1096]: time="2025-05-15T10:37:50Z" level=info msg="torcx already run" May 15 10:37:50.489472 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:37:50.489487 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:37:50.506221 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:37:50.557000 audit: BPF prog-id=27 op=LOAD May 15 10:37:50.557000 audit: BPF prog-id=23 op=UNLOAD May 15 10:37:50.558000 audit: BPF prog-id=28 op=LOAD May 15 10:37:50.558000 audit: BPF prog-id=18 op=UNLOAD May 15 10:37:50.558000 audit: BPF prog-id=29 op=LOAD May 15 10:37:50.558000 audit: BPF prog-id=30 op=LOAD May 15 10:37:50.558000 audit: BPF prog-id=19 op=UNLOAD May 15 10:37:50.558000 audit: BPF prog-id=20 op=UNLOAD May 15 10:37:50.558000 audit: BPF prog-id=31 op=LOAD May 15 10:37:50.558000 audit: BPF prog-id=24 op=UNLOAD May 15 10:37:50.558000 audit: BPF prog-id=32 op=LOAD May 15 10:37:50.558000 audit: BPF prog-id=33 op=LOAD May 15 10:37:50.558000 audit: BPF prog-id=25 op=UNLOAD May 15 10:37:50.558000 audit: BPF prog-id=26 op=UNLOAD May 15 10:37:50.560000 audit: BPF prog-id=34 op=LOAD May 15 10:37:50.560000 audit: BPF prog-id=35 op=LOAD May 15 10:37:50.560000 audit: BPF prog-id=21 op=UNLOAD May 15 10:37:50.560000 audit: BPF prog-id=22 op=UNLOAD May 15 10:37:50.562571 systemd[1]: Finished ldconfig.service. May 15 10:37:50.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.563769 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:37:50.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.567647 systemd[1]: Starting audit-rules.service... May 15 10:37:50.569429 systemd[1]: Starting clean-ca-certificates.service... May 15 10:37:50.571741 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:37:50.573000 audit: BPF prog-id=36 op=LOAD May 15 10:37:50.574357 systemd[1]: Starting systemd-resolved.service... May 15 10:37:50.575000 audit: BPF prog-id=37 op=LOAD May 15 10:37:50.576693 systemd[1]: Starting systemd-timesyncd.service... May 15 10:37:50.578477 systemd[1]: Starting systemd-update-utmp.service... May 15 10:37:50.579848 systemd[1]: Finished clean-ca-certificates.service. May 15 10:37:50.580000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.582773 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:37:50.587000 audit[1147]: SYSTEM_BOOT pid=1147 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:37:50.587582 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:50.587810 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:37:50.589385 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:37:50.591226 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:37:50.593147 systemd[1]: Starting modprobe@loop.service... May 15 10:37:50.593933 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:37:50.594082 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:37:50.594247 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:37:50.594359 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:50.596149 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:37:50.596262 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:37:50.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.597000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.598067 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:37:50.598194 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:37:50.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.599566 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:37:50.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.601189 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:37:50.601296 systemd[1]: Finished modprobe@loop.service. May 15 10:37:50.602000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:37:50.602334 augenrules[1159]: No rules May 15 10:37:50.602000 audit[1159]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffcef5a1660 a2=420 a3=0 items=0 ppid=1136 pid=1159 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:50.602000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:37:50.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:50.607242 systemd[1]: Finished audit-rules.service. May 15 10:37:50.608536 systemd[1]: Finished systemd-update-utmp.service. May 15 10:37:50.611560 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:50.611740 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:37:50.612882 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:37:50.614789 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:37:50.616387 systemd[1]: Starting modprobe@loop.service... May 15 10:37:50.617223 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:37:50.617314 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:37:50.618297 systemd[1]: Starting systemd-update-done.service... May 15 10:37:50.619269 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:37:50.619349 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:50.620190 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:37:50.620293 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:37:50.621580 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:37:50.621689 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:37:50.622912 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:37:50.623004 systemd[1]: Finished modprobe@loop.service. May 15 10:37:50.624131 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:37:50.624215 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:37:50.626720 systemd[1]: Finished systemd-update-done.service. May 15 10:37:50.628064 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:50.628270 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:37:50.629439 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:37:50.631561 systemd[1]: Starting modprobe@drm.service... May 15 10:37:50.633481 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:37:50.635311 systemd[1]: Starting modprobe@loop.service... May 15 10:37:50.636161 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:37:50.636350 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:37:50.637363 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:37:50.638472 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:37:50.638670 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:37:50.639711 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:37:50.639840 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:37:50.641290 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:37:50.641386 systemd[1]: Finished modprobe@drm.service. May 15 10:37:50.642661 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:37:50.642758 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:37:50.643989 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:37:50.644080 systemd[1]: Finished modprobe@loop.service. May 15 10:37:50.645370 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:37:50.645458 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:37:50.646586 systemd[1]: Finished ensure-sysext.service. May 15 10:37:50.647187 systemd-resolved[1142]: Positive Trust Anchors: May 15 10:37:50.647201 systemd-resolved[1142]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:37:50.647228 systemd-resolved[1142]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:37:50.647592 systemd[1]: Started systemd-timesyncd.service. May 15 10:37:50.649056 systemd[1]: Reached target time-set.target. May 15 10:37:50.649084 systemd-timesyncd[1146]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:37:50.649144 systemd-timesyncd[1146]: Initial clock synchronization to Thu 2025-05-15 10:37:50.565615 UTC. May 15 10:37:50.654719 systemd-resolved[1142]: Defaulting to hostname 'linux'. May 15 10:37:50.656003 systemd[1]: Started systemd-resolved.service. May 15 10:37:50.656901 systemd[1]: Reached target network.target. May 15 10:37:50.657745 systemd[1]: Reached target nss-lookup.target. May 15 10:37:50.658581 systemd[1]: Reached target sysinit.target. May 15 10:37:50.659449 systemd[1]: Started motdgen.path. May 15 10:37:50.660197 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:37:50.661442 systemd[1]: Started logrotate.timer. May 15 10:37:50.662273 systemd[1]: Started mdadm.timer. May 15 10:37:50.662981 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:37:50.663868 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:37:50.663893 systemd[1]: Reached target paths.target. May 15 10:37:50.664669 systemd[1]: Reached target timers.target. May 15 10:37:50.665694 systemd[1]: Listening on dbus.socket. May 15 10:37:50.667349 systemd[1]: Starting docker.socket... May 15 10:37:50.670493 systemd[1]: Listening on sshd.socket. May 15 10:37:50.671362 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:37:50.671687 systemd[1]: Listening on docker.socket. May 15 10:37:50.672515 systemd[1]: Reached target sockets.target. May 15 10:37:50.673346 systemd[1]: Reached target basic.target. May 15 10:37:50.674160 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:37:50.674183 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:37:50.674938 systemd[1]: Starting containerd.service... May 15 10:37:50.676518 systemd[1]: Starting dbus.service... May 15 10:37:50.677955 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:37:50.679817 systemd[1]: Starting extend-filesystems.service... May 15 10:37:50.680857 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:37:50.682210 jq[1179]: false May 15 10:37:50.681723 systemd[1]: Starting motdgen.service... May 15 10:37:50.683284 systemd[1]: Starting prepare-helm.service... May 15 10:37:50.684967 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:37:50.686713 systemd[1]: Starting sshd-keygen.service... May 15 10:37:50.689881 systemd[1]: Starting systemd-logind.service... May 15 10:37:50.690663 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:37:50.690706 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:37:50.691015 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:37:50.691543 systemd[1]: Starting update-engine.service... May 15 10:37:50.693565 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:37:50.696029 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:37:50.696190 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:37:50.696437 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:37:50.696556 systemd[1]: Finished motdgen.service. May 15 10:37:50.697521 jq[1197]: true May 15 10:37:50.698027 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:37:50.698185 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:37:50.704837 extend-filesystems[1180]: Found loop1 May 15 10:37:50.706086 extend-filesystems[1180]: Found sr0 May 15 10:37:50.708821 extend-filesystems[1180]: Found vda May 15 10:37:50.709618 jq[1201]: true May 15 10:37:50.709759 extend-filesystems[1180]: Found vda1 May 15 10:37:50.709759 extend-filesystems[1180]: Found vda2 May 15 10:37:50.709759 extend-filesystems[1180]: Found vda3 May 15 10:37:50.709759 extend-filesystems[1180]: Found usr May 15 10:37:50.709759 extend-filesystems[1180]: Found vda4 May 15 10:37:50.709759 extend-filesystems[1180]: Found vda6 May 15 10:37:50.709759 extend-filesystems[1180]: Found vda7 May 15 10:37:50.709759 extend-filesystems[1180]: Found vda9 May 15 10:37:50.709759 extend-filesystems[1180]: Checking size of /dev/vda9 May 15 10:37:50.715871 systemd[1]: Started dbus.service. May 15 10:37:50.712514 dbus-daemon[1178]: [system] SELinux support is enabled May 15 10:37:50.719874 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:37:50.719898 systemd[1]: Reached target system-config.target. May 15 10:37:50.720943 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:37:50.720957 systemd[1]: Reached target user-config.target. May 15 10:37:50.722336 tar[1199]: linux-amd64/helm May 15 10:37:50.749906 update_engine[1194]: I0515 10:37:50.749598 1194 main.cc:92] Flatcar Update Engine starting May 15 10:37:50.750177 extend-filesystems[1180]: Resized partition /dev/vda9 May 15 10:37:50.751802 extend-filesystems[1231]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:37:50.756737 systemd[1]: Started update-engine.service. May 15 10:37:50.758218 update_engine[1194]: I0515 10:37:50.758180 1194 update_check_scheduler.cc:74] Next update check in 10m37s May 15 10:37:50.759997 systemd[1]: Started locksmithd.service. May 15 10:37:50.761133 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:37:50.762783 systemd-logind[1192]: Watching system buttons on /dev/input/event1 (Power Button) May 15 10:37:50.762815 systemd-logind[1192]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 10:37:50.763173 systemd-logind[1192]: New seat seat0. May 15 10:37:50.766340 systemd[1]: Started systemd-logind.service. May 15 10:37:50.780811 env[1202]: time="2025-05-15T10:37:50.780754152Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:37:50.783104 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:37:50.788229 bash[1228]: Updated "/home/core/.ssh/authorized_keys" May 15 10:37:50.788881 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.798975349Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.805745518Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.807136758Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.807160492Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.807350679Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.807365106Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.807376097Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.807384823Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.807441990Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:37:50.809799 env[1202]: time="2025-05-15T10:37:50.807629993Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:37:50.810008 extend-filesystems[1231]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:37:50.810008 extend-filesystems[1231]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:37:50.810008 extend-filesystems[1231]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:37:50.809837 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:37:50.814385 env[1202]: time="2025-05-15T10:37:50.807730772Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:37:50.814385 env[1202]: time="2025-05-15T10:37:50.807743686Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:37:50.814385 env[1202]: time="2025-05-15T10:37:50.807781036Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:37:50.814385 env[1202]: time="2025-05-15T10:37:50.807791396Z" level=info msg="metadata content store policy set" policy=shared May 15 10:37:50.814480 extend-filesystems[1180]: Resized filesystem in /dev/vda9 May 15 10:37:50.809985 systemd[1]: Finished extend-filesystems.service. May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820493251Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820543665Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820561529Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820620890Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820635858Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820649845Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820661717Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820674531Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820686543Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820699127Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820711360Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820726007Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820847886Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:37:50.821934 env[1202]: time="2025-05-15T10:37:50.820927465Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821194937Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821217620Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821230884Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821282331Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821293582Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821305134Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821317146Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821328397Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821342714Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821353044Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821364405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821376568Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821471776Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821484570Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822227 env[1202]: time="2025-05-15T10:37:50.821496523Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822492 env[1202]: time="2025-05-15T10:37:50.821507644Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:37:50.822492 env[1202]: time="2025-05-15T10:37:50.821523062Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:37:50.822492 env[1202]: time="2025-05-15T10:37:50.821532460Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:37:50.822492 env[1202]: time="2025-05-15T10:37:50.821551606Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:37:50.822492 env[1202]: time="2025-05-15T10:37:50.821583185Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:37:50.822588 env[1202]: time="2025-05-15T10:37:50.821770827Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:37:50.822588 env[1202]: time="2025-05-15T10:37:50.821855446Z" level=info msg="Connect containerd service" May 15 10:37:50.822588 env[1202]: time="2025-05-15T10:37:50.821884410Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:37:50.823337 env[1202]: time="2025-05-15T10:37:50.823253468Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:37:50.824710 env[1202]: time="2025-05-15T10:37:50.823712820Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:37:50.824710 env[1202]: time="2025-05-15T10:37:50.823757774Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:37:50.824710 env[1202]: time="2025-05-15T10:37:50.823958250Z" level=info msg="containerd successfully booted in 0.054735s" May 15 10:37:50.823891 systemd[1]: Started containerd.service. May 15 10:37:50.827554 env[1202]: time="2025-05-15T10:37:50.827268680Z" level=info msg="Start subscribing containerd event" May 15 10:37:50.827554 env[1202]: time="2025-05-15T10:37:50.827329724Z" level=info msg="Start recovering state" May 15 10:37:50.827554 env[1202]: time="2025-05-15T10:37:50.827389616Z" level=info msg="Start event monitor" May 15 10:37:50.827554 env[1202]: time="2025-05-15T10:37:50.827399856Z" level=info msg="Start snapshots syncer" May 15 10:37:50.827554 env[1202]: time="2025-05-15T10:37:50.827408181Z" level=info msg="Start cni network conf syncer for default" May 15 10:37:50.827554 env[1202]: time="2025-05-15T10:37:50.827415124Z" level=info msg="Start streaming server" May 15 10:37:50.831113 locksmithd[1232]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:37:51.108162 tar[1199]: linux-amd64/LICENSE May 15 10:37:51.108371 tar[1199]: linux-amd64/README.md May 15 10:37:51.111580 systemd[1]: Finished prepare-helm.service. May 15 10:37:51.345056 sshd_keygen[1200]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:37:51.361667 systemd[1]: Finished sshd-keygen.service. May 15 10:37:51.363835 systemd[1]: Starting issuegen.service... May 15 10:37:51.367882 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:37:51.367998 systemd[1]: Finished issuegen.service. May 15 10:37:51.369947 systemd[1]: Starting systemd-user-sessions.service... May 15 10:37:51.375002 systemd[1]: Finished systemd-user-sessions.service. May 15 10:37:51.377214 systemd[1]: Started getty@tty1.service. May 15 10:37:51.378952 systemd[1]: Started serial-getty@ttyS0.service. May 15 10:37:51.380156 systemd[1]: Reached target getty.target. May 15 10:37:51.608251 systemd-networkd[1035]: eth0: Gained IPv6LL May 15 10:37:51.609864 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:37:51.611284 systemd[1]: Reached target network-online.target. May 15 10:37:51.613523 systemd[1]: Starting kubelet.service... May 15 10:37:52.141709 systemd[1]: Started kubelet.service. May 15 10:37:52.143051 systemd[1]: Reached target multi-user.target. May 15 10:37:52.145332 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:37:52.151660 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:37:52.151814 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:37:52.153127 systemd[1]: Startup finished in 592ms (kernel) + 4.562s (initrd) + 5.887s (userspace) = 11.042s. May 15 10:37:52.626398 kubelet[1259]: E0515 10:37:52.626279 1259 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:37:52.628128 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:37:52.628239 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:37:54.567295 systemd[1]: Created slice system-sshd.slice. May 15 10:37:54.568642 systemd[1]: Started sshd@0-10.0.0.44:22-10.0.0.1:53092.service. May 15 10:37:54.662808 sshd[1269]: Accepted publickey for core from 10.0.0.1 port 53092 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:37:54.670351 sshd[1269]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:37:54.705194 systemd-logind[1192]: New session 1 of user core. May 15 10:37:54.705919 systemd[1]: Created slice user-500.slice. May 15 10:37:54.711015 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:37:54.729778 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:37:54.741521 systemd[1]: Starting user@500.service... May 15 10:37:54.746515 (systemd)[1272]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:37:54.900661 systemd[1272]: Queued start job for default target default.target. May 15 10:37:54.901405 systemd[1272]: Reached target paths.target. May 15 10:37:54.901435 systemd[1272]: Reached target sockets.target. May 15 10:37:54.901453 systemd[1272]: Reached target timers.target. May 15 10:37:54.901468 systemd[1272]: Reached target basic.target. May 15 10:37:54.901528 systemd[1272]: Reached target default.target. May 15 10:37:54.901563 systemd[1272]: Startup finished in 143ms. May 15 10:37:54.901624 systemd[1]: Started user@500.service. May 15 10:37:54.902763 systemd[1]: Started session-1.scope. May 15 10:37:54.974429 systemd[1]: Started sshd@1-10.0.0.44:22-10.0.0.1:53102.service. May 15 10:37:55.036995 sshd[1281]: Accepted publickey for core from 10.0.0.1 port 53102 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:37:55.039363 sshd[1281]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:37:55.048433 systemd[1]: Started session-2.scope. May 15 10:37:55.049315 systemd-logind[1192]: New session 2 of user core. May 15 10:37:55.126252 sshd[1281]: pam_unix(sshd:session): session closed for user core May 15 10:37:55.132114 systemd[1]: Started sshd@2-10.0.0.44:22-10.0.0.1:53116.service. May 15 10:37:55.139129 systemd[1]: sshd@1-10.0.0.44:22-10.0.0.1:53102.service: Deactivated successfully. May 15 10:37:55.140000 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:37:55.141136 systemd-logind[1192]: Session 2 logged out. Waiting for processes to exit. May 15 10:37:55.142821 systemd-logind[1192]: Removed session 2. May 15 10:37:55.181885 sshd[1286]: Accepted publickey for core from 10.0.0.1 port 53116 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:37:55.184373 sshd[1286]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:37:55.192686 systemd-logind[1192]: New session 3 of user core. May 15 10:37:55.192746 systemd[1]: Started session-3.scope. May 15 10:37:55.263908 sshd[1286]: pam_unix(sshd:session): session closed for user core May 15 10:37:55.268101 systemd[1]: Started sshd@3-10.0.0.44:22-10.0.0.1:53126.service. May 15 10:37:55.283440 systemd[1]: sshd@2-10.0.0.44:22-10.0.0.1:53116.service: Deactivated successfully. May 15 10:37:55.284417 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:37:55.287208 systemd-logind[1192]: Session 3 logged out. Waiting for processes to exit. May 15 10:37:55.288668 systemd-logind[1192]: Removed session 3. May 15 10:37:55.318137 sshd[1293]: Accepted publickey for core from 10.0.0.1 port 53126 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:37:55.319650 sshd[1293]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:37:55.324597 systemd-logind[1192]: New session 4 of user core. May 15 10:37:55.325952 systemd[1]: Started session-4.scope. May 15 10:37:55.404590 sshd[1293]: pam_unix(sshd:session): session closed for user core May 15 10:37:55.410536 systemd[1]: Started sshd@4-10.0.0.44:22-10.0.0.1:53130.service. May 15 10:37:55.411255 systemd[1]: sshd@3-10.0.0.44:22-10.0.0.1:53126.service: Deactivated successfully. May 15 10:37:55.411991 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:37:55.412901 systemd-logind[1192]: Session 4 logged out. Waiting for processes to exit. May 15 10:37:55.414645 systemd-logind[1192]: Removed session 4. May 15 10:37:55.462986 sshd[1299]: Accepted publickey for core from 10.0.0.1 port 53130 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:37:55.466316 sshd[1299]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:37:55.477691 systemd[1]: Started session-5.scope. May 15 10:37:55.477829 systemd-logind[1192]: New session 5 of user core. May 15 10:37:55.571768 sudo[1303]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:37:55.572001 sudo[1303]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:37:55.587518 dbus-daemon[1178]: \xd0\u001d\x83\xa1\x8dU: received setenforce notice (enforcing=1003206752) May 15 10:37:55.591301 sudo[1303]: pam_unix(sudo:session): session closed for user root May 15 10:37:55.601123 sshd[1299]: pam_unix(sshd:session): session closed for user core May 15 10:37:55.611393 systemd[1]: Started sshd@5-10.0.0.44:22-10.0.0.1:53132.service. May 15 10:37:55.612032 systemd[1]: sshd@4-10.0.0.44:22-10.0.0.1:53130.service: Deactivated successfully. May 15 10:37:55.612805 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:37:55.617052 systemd-logind[1192]: Session 5 logged out. Waiting for processes to exit. May 15 10:37:55.624494 systemd-logind[1192]: Removed session 5. May 15 10:37:55.659795 sshd[1306]: Accepted publickey for core from 10.0.0.1 port 53132 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:37:55.661554 sshd[1306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:37:55.676378 systemd-logind[1192]: New session 6 of user core. May 15 10:37:55.681527 systemd[1]: Started session-6.scope. May 15 10:37:55.760622 sudo[1311]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:37:55.760898 sudo[1311]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:37:55.768277 sudo[1311]: pam_unix(sudo:session): session closed for user root May 15 10:37:55.778404 sudo[1310]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:37:55.778666 sudo[1310]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:37:55.792882 systemd[1]: Stopping audit-rules.service... May 15 10:37:55.795000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:37:55.797500 kernel: kauditd_printk_skb: 233 callbacks suppressed May 15 10:37:55.797547 kernel: audit: type=1305 audit(1747305475.795:195): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:37:55.798665 auditctl[1314]: No rules May 15 10:37:55.795000 audit[1314]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3bfb36e0 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:55.800474 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:37:55.800691 systemd[1]: Stopped audit-rules.service. May 15 10:37:55.802759 systemd[1]: Starting audit-rules.service... May 15 10:37:55.808111 kernel: audit: type=1300 audit(1747305475.795:195): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe3bfb36e0 a2=420 a3=0 items=0 ppid=1 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:55.809194 kernel: audit: type=1327 audit(1747305475.795:195): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:37:55.795000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:37:55.809968 kernel: audit: type=1131 audit(1747305475.799:196): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:55.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:55.837978 augenrules[1331]: No rules May 15 10:37:55.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:55.839303 systemd[1]: Finished audit-rules.service. May 15 10:37:55.841461 sudo[1310]: pam_unix(sudo:session): session closed for user root May 15 10:37:55.839000 audit[1310]: USER_END pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:37:55.847058 sshd[1306]: pam_unix(sshd:session): session closed for user core May 15 10:37:55.850397 systemd[1]: sshd@5-10.0.0.44:22-10.0.0.1:53132.service: Deactivated successfully. May 15 10:37:55.851282 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:37:55.852686 kernel: audit: type=1130 audit(1747305475.839:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:55.852750 kernel: audit: type=1106 audit(1747305475.839:198): pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:37:55.852772 kernel: audit: type=1104 audit(1747305475.839:199): pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:37:55.839000 audit[1310]: CRED_DISP pid=1310 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:37:55.853977 systemd-logind[1192]: Session 6 logged out. Waiting for processes to exit. May 15 10:37:55.858246 kernel: audit: type=1106 audit(1747305475.846:200): pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:37:55.846000 audit[1306]: USER_END pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:37:55.864393 kernel: audit: type=1104 audit(1747305475.846:201): pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:37:55.846000 audit[1306]: CRED_DISP pid=1306 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:37:55.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.44:22-10.0.0.1:53132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:55.872823 kernel: audit: type=1131 audit(1747305475.849:202): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.44:22-10.0.0.1:53132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:55.873469 systemd[1]: Started sshd@6-10.0.0.44:22-10.0.0.1:53140.service. May 15 10:37:55.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.44:22-10.0.0.1:53140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:55.874824 systemd-logind[1192]: Removed session 6. May 15 10:37:55.929000 audit[1337]: USER_ACCT pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:37:55.931146 sshd[1337]: Accepted publickey for core from 10.0.0.1 port 53140 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:37:55.931000 audit[1337]: CRED_ACQ pid=1337 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:37:55.932000 audit[1337]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd3f8960a0 a2=3 a3=0 items=0 ppid=1 pid=1337 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:55.932000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:37:55.933529 sshd[1337]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:37:55.941812 systemd-logind[1192]: New session 7 of user core. May 15 10:37:55.943004 systemd[1]: Started session-7.scope. May 15 10:37:56.009000 audit[1337]: USER_START pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:37:56.013000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:37:56.066866 sudo[1340]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:37:56.063000 audit[1340]: USER_ACCT pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:37:56.066000 audit[1340]: CRED_REFR pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:37:56.070065 sudo[1340]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:37:56.074000 audit[1340]: USER_START pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:37:56.119111 systemd[1]: Starting docker.service... May 15 10:37:56.227578 env[1351]: time="2025-05-15T10:37:56.227013186Z" level=info msg="Starting up" May 15 10:37:56.235345 env[1351]: time="2025-05-15T10:37:56.231858533Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:37:56.235345 env[1351]: time="2025-05-15T10:37:56.231894488Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:37:56.235345 env[1351]: time="2025-05-15T10:37:56.231917716Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:37:56.235345 env[1351]: time="2025-05-15T10:37:56.231929117Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:37:56.244572 env[1351]: time="2025-05-15T10:37:56.244001826Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:37:56.244572 env[1351]: time="2025-05-15T10:37:56.244037671Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:37:56.244572 env[1351]: time="2025-05-15T10:37:56.244062195Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:37:56.244572 env[1351]: time="2025-05-15T10:37:56.244075399Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:37:56.872554 env[1351]: time="2025-05-15T10:37:56.871687092Z" level=info msg="Loading containers: start." May 15 10:37:57.038000 audit[1385]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.038000 audit[1385]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe885fc4d0 a2=0 a3=7ffe885fc4bc items=0 ppid=1351 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.038000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:37:57.043000 audit[1387]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.043000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff2737dda0 a2=0 a3=7fff2737dd8c items=0 ppid=1351 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.043000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:37:57.046000 audit[1389]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.046000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc81261820 a2=0 a3=7ffc8126180c items=0 ppid=1351 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.046000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:37:57.049000 audit[1391]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.049000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdc542e610 a2=0 a3=7ffdc542e5fc items=0 ppid=1351 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.049000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:37:57.056000 audit[1393]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1393 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.056000 audit[1393]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc9b111310 a2=0 a3=7ffc9b1112fc items=0 ppid=1351 pid=1393 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.056000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:37:57.095000 audit[1398]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.095000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd4852b430 a2=0 a3=7ffd4852b41c items=0 ppid=1351 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.095000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:37:57.120000 audit[1400]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.120000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe9759b4f0 a2=0 a3=7ffe9759b4dc items=0 ppid=1351 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:37:57.124000 audit[1402]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1402 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.124000 audit[1402]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffbb3a5cd0 a2=0 a3=7fffbb3a5cbc items=0 ppid=1351 pid=1402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.124000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:37:57.128000 audit[1404]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.128000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc5673fc90 a2=0 a3=7ffc5673fc7c items=0 ppid=1351 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:37:57.158000 audit[1408]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1408 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.158000 audit[1408]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffed8d9ef40 a2=0 a3=7ffed8d9ef2c items=0 ppid=1351 pid=1408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.158000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:37:57.171000 audit[1409]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.171000 audit[1409]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd61005050 a2=0 a3=7ffd6100503c items=0 ppid=1351 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:37:57.194743 kernel: Initializing XFRM netlink socket May 15 10:37:57.271616 env[1351]: time="2025-05-15T10:37:57.271288840Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:37:57.322000 audit[1417]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.322000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff19c20e70 a2=0 a3=7fff19c20e5c items=0 ppid=1351 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.322000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:37:57.347000 audit[1420]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.347000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe387a46d0 a2=0 a3=7ffe387a46bc items=0 ppid=1351 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.347000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:37:57.360000 audit[1423]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.360000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc05d156e0 a2=0 a3=7ffc05d156cc items=0 ppid=1351 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.360000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:37:57.362000 audit[1425]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.362000 audit[1425]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc463ece40 a2=0 a3=7ffc463ece2c items=0 ppid=1351 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.362000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:37:57.366000 audit[1427]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1427 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.366000 audit[1427]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffdb4da5390 a2=0 a3=7ffdb4da537c items=0 ppid=1351 pid=1427 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.366000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:37:57.370000 audit[1429]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1429 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.370000 audit[1429]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe9a606ec0 a2=0 a3=7ffe9a606eac items=0 ppid=1351 pid=1429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.370000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:37:57.375000 audit[1431]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.375000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdb3a17440 a2=0 a3=7ffdb3a1742c items=0 ppid=1351 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.375000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:37:57.391000 audit[1434]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.391000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffea773d330 a2=0 a3=7ffea773d31c items=0 ppid=1351 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.391000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:37:57.397000 audit[1436]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.397000 audit[1436]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe0ea7e4e0 a2=0 a3=7ffe0ea7e4cc items=0 ppid=1351 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:37:57.404000 audit[1438]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1438 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.404000 audit[1438]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff6a0d3540 a2=0 a3=7fff6a0d352c items=0 ppid=1351 pid=1438 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.404000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:37:57.412000 audit[1440]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1440 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.412000 audit[1440]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcbbe11fd0 a2=0 a3=7ffcbbe11fbc items=0 ppid=1351 pid=1440 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.412000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:37:57.419201 systemd-networkd[1035]: docker0: Link UP May 15 10:37:57.446000 audit[1444]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1444 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.446000 audit[1444]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe3878bce0 a2=0 a3=7ffe3878bccc items=0 ppid=1351 pid=1444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.446000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:37:57.459000 audit[1445]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:37:57.459000 audit[1445]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff003a37a0 a2=0 a3=7fff003a378c items=0 ppid=1351 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:37:57.459000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:37:57.462398 env[1351]: time="2025-05-15T10:37:57.461947244Z" level=info msg="Loading containers: done." May 15 10:37:57.489882 env[1351]: time="2025-05-15T10:37:57.489711502Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:37:57.490140 env[1351]: time="2025-05-15T10:37:57.489965536Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:37:57.490140 env[1351]: time="2025-05-15T10:37:57.490108395Z" level=info msg="Daemon has completed initialization" May 15 10:37:57.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:37:57.545670 systemd[1]: Started docker.service. May 15 10:37:57.558801 env[1351]: time="2025-05-15T10:37:57.556627125Z" level=info msg="API listen on /run/docker.sock" May 15 10:37:59.593885 env[1202]: time="2025-05-15T10:37:59.593823911Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\"" May 15 10:38:00.466250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1349440237.mount: Deactivated successfully. May 15 10:38:02.879212 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:38:02.888394 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 10:38:02.888466 kernel: audit: type=1130 audit(1747305482.878:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:02.888505 kernel: audit: type=1131 audit(1747305482.878:238): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:02.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:02.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:02.879475 systemd[1]: Stopped kubelet.service. May 15 10:38:02.882369 systemd[1]: Starting kubelet.service... May 15 10:38:02.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:02.997974 systemd[1]: Started kubelet.service. May 15 10:38:03.004031 kernel: audit: type=1130 audit(1747305482.997:239): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:03.252760 env[1202]: time="2025-05-15T10:38:03.251477411Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:03.262370 env[1202]: time="2025-05-15T10:38:03.261185399Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:03.263658 kubelet[1495]: E0515 10:38:03.263598 1495 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:38:03.267884 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:38:03.268035 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:38:03.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:03.269576 env[1202]: time="2025-05-15T10:38:03.269049812Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:03.274879 kernel: audit: type=1131 audit(1747305483.267:240): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:03.276497 env[1202]: time="2025-05-15T10:38:03.276206623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:4878682f7a044274d42399a6316ef452c5411aafd4ad99cc57de7235ca490e4e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:03.276883 env[1202]: time="2025-05-15T10:38:03.276790782Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.30.12\" returns image reference \"sha256:e113c59aa22f0650435e2a3ed64aadb01e87f3d2835aa3825fe078cd39699bfb\"" May 15 10:38:03.293537 env[1202]: time="2025-05-15T10:38:03.293268079Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\"" May 15 10:38:05.634303 env[1202]: time="2025-05-15T10:38:05.634241849Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:05.636318 env[1202]: time="2025-05-15T10:38:05.636278905Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:05.638319 env[1202]: time="2025-05-15T10:38:05.638290544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:05.640049 env[1202]: time="2025-05-15T10:38:05.640002854Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:3a36711d0409d565b370a18d0c19339e93d4f1b1f2b3fd382eb31c714c463b74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:05.640824 env[1202]: time="2025-05-15T10:38:05.640784464Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.30.12\" returns image reference \"sha256:70742b7b7d90a618a1fa06d89248dbe2c291c19d7f75f4ad60a69d0454dbbac8\"" May 15 10:38:05.649321 env[1202]: time="2025-05-15T10:38:05.649290436Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\"" May 15 10:38:06.848835 env[1202]: time="2025-05-15T10:38:06.848778310Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:06.851625 env[1202]: time="2025-05-15T10:38:06.851527311Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:06.853393 env[1202]: time="2025-05-15T10:38:06.853370227Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:06.855109 env[1202]: time="2025-05-15T10:38:06.855080450Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:521c843d01025be7d4e246ddee8cde74556eb9813c606d6db9f0f03236f6d029,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:06.855941 env[1202]: time="2025-05-15T10:38:06.855903506Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.30.12\" returns image reference \"sha256:c0b91cfea9f9a1c09fc5d056f3a015e52604fd0d63671ff5bf31e642402ef05d\"" May 15 10:38:06.866705 env[1202]: time="2025-05-15T10:38:06.866346329Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\"" May 15 10:38:08.230239 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1087825411.mount: Deactivated successfully. May 15 10:38:09.196721 env[1202]: time="2025-05-15T10:38:09.196633211Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:09.200020 env[1202]: time="2025-05-15T10:38:09.199960719Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:09.201539 env[1202]: time="2025-05-15T10:38:09.201506533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.30.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:09.202944 env[1202]: time="2025-05-15T10:38:09.202909594Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:ea8c7d5392acf6b0c11ebba78301e1a6c2dc6abcd7544102ed578e49d1c82f15,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:09.203352 env[1202]: time="2025-05-15T10:38:09.203323550Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.30.12\" returns image reference \"sha256:c9356fea5d151501039907c3ba870272461396117eabc74063632616f4e31b2b\"" May 15 10:38:09.211463 env[1202]: time="2025-05-15T10:38:09.211420845Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 10:38:09.675883 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3453177051.mount: Deactivated successfully. May 15 10:38:10.686353 env[1202]: time="2025-05-15T10:38:10.686289314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:10.690012 env[1202]: time="2025-05-15T10:38:10.689951005Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:10.692427 env[1202]: time="2025-05-15T10:38:10.692368679Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:10.694023 env[1202]: time="2025-05-15T10:38:10.693990065Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:10.694720 env[1202]: time="2025-05-15T10:38:10.694673223Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 10:38:10.702842 env[1202]: time="2025-05-15T10:38:10.702776127Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" May 15 10:38:11.146772 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2314968337.mount: Deactivated successfully. May 15 10:38:11.152670 env[1202]: time="2025-05-15T10:38:11.152603773Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:11.154438 env[1202]: time="2025-05-15T10:38:11.154415245Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:11.155654 env[1202]: time="2025-05-15T10:38:11.155619016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:11.157045 env[1202]: time="2025-05-15T10:38:11.157019844Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:11.157450 env[1202]: time="2025-05-15T10:38:11.157421638Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" May 15 10:38:11.165189 env[1202]: time="2025-05-15T10:38:11.165166814Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\"" May 15 10:38:11.646339 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3418489225.mount: Deactivated successfully. May 15 10:38:13.518983 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:38:13.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:13.519228 systemd[1]: Stopped kubelet.service. May 15 10:38:13.520741 systemd[1]: Starting kubelet.service... May 15 10:38:13.539321 kernel: audit: type=1130 audit(1747305493.518:241): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:13.539479 kernel: audit: type=1131 audit(1747305493.518:242): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:13.518000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:13.600357 systemd[1]: Started kubelet.service. May 15 10:38:13.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:13.605115 kernel: audit: type=1130 audit(1747305493.599:243): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:13.650299 kubelet[1545]: E0515 10:38:13.650237 1545 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:38:13.652112 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:38:13.652232 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:38:13.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:13.656112 kernel: audit: type=1131 audit(1747305493.651:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:15.567667 env[1202]: time="2025-05-15T10:38:15.567599769Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:15.569696 env[1202]: time="2025-05-15T10:38:15.569649328Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:15.571345 env[1202]: time="2025-05-15T10:38:15.571302390Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.12-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:15.572911 env[1202]: time="2025-05-15T10:38:15.572876698Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:44a8e24dcbba3470ee1fee21d5e88d128c936e9b55d4bc51fbef8086f8ed123b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:15.573585 env[1202]: time="2025-05-15T10:38:15.573552831Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.12-0\" returns image reference \"sha256:3861cfcd7c04ccac1f062788eca39487248527ef0c0cfd477a83d7691a75a899\"" May 15 10:38:18.447538 systemd[1]: Stopped kubelet.service. May 15 10:38:18.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.449302 systemd[1]: Starting kubelet.service... May 15 10:38:18.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.454734 kernel: audit: type=1130 audit(1747305498.446:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.454792 kernel: audit: type=1131 audit(1747305498.446:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.465772 systemd[1]: Reloading. May 15 10:38:18.527292 /usr/lib/systemd/system-generators/torcx-generator[1649]: time="2025-05-15T10:38:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:18.527317 /usr/lib/systemd/system-generators/torcx-generator[1649]: time="2025-05-15T10:38:18Z" level=info msg="torcx already run" May 15 10:38:18.836995 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:18.837010 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:18.853816 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:18.932301 kernel: audit: type=1400 audit(1747305498.915:247): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932560 kernel: audit: type=1400 audit(1747305498.915:248): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932595 kernel: audit: type=1400 audit(1747305498.915:249): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.936631 kernel: audit: type=1400 audit(1747305498.915:250): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.936757 kernel: audit: type=1400 audit(1747305498.915:251): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.944159 kernel: audit: type=1400 audit(1747305498.915:252): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.944259 kernel: audit: type=1400 audit(1747305498.915:253): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.947984 kernel: audit: type=1400 audit(1747305498.915:254): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.951922 kernel: audit: type=1400 audit(1747305498.915:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.955724 kernel: audit: type=1400 audit(1747305498.924:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit: BPF prog-id=43 op=LOAD May 15 10:38:18.924000 audit: BPF prog-id=38 op=UNLOAD May 15 10:38:18.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit: BPF prog-id=44 op=LOAD May 15 10:38:18.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.932000 audit: BPF prog-id=45 op=LOAD May 15 10:38:18.932000 audit: BPF prog-id=39 op=UNLOAD May 15 10:38:18.932000 audit: BPF prog-id=40 op=UNLOAD May 15 10:38:18.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.934000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit: BPF prog-id=46 op=LOAD May 15 10:38:18.942000 audit: BPF prog-id=41 op=UNLOAD May 15 10:38:18.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.947000 audit: BPF prog-id=47 op=LOAD May 15 10:38:18.947000 audit: BPF prog-id=27 op=UNLOAD May 15 10:38:18.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.955000 audit: BPF prog-id=48 op=LOAD May 15 10:38:18.955000 audit: BPF prog-id=28 op=UNLOAD May 15 10:38:18.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.955000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit: BPF prog-id=49 op=LOAD May 15 10:38:18.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.959000 audit: BPF prog-id=50 op=LOAD May 15 10:38:18.959000 audit: BPF prog-id=29 op=UNLOAD May 15 10:38:18.959000 audit: BPF prog-id=30 op=UNLOAD May 15 10:38:18.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit: BPF prog-id=51 op=LOAD May 15 10:38:18.965000 audit: BPF prog-id=31 op=UNLOAD May 15 10:38:18.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit: BPF prog-id=52 op=LOAD May 15 10:38:18.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.968000 audit: BPF prog-id=53 op=LOAD May 15 10:38:18.968000 audit: BPF prog-id=32 op=UNLOAD May 15 10:38:18.968000 audit: BPF prog-id=33 op=UNLOAD May 15 10:38:18.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.970000 audit: BPF prog-id=54 op=LOAD May 15 10:38:18.970000 audit: BPF prog-id=37 op=UNLOAD May 15 10:38:18.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.972000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.973000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.973000 audit: BPF prog-id=55 op=LOAD May 15 10:38:18.973000 audit: BPF prog-id=36 op=UNLOAD May 15 10:38:18.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.974000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.974000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.975000 audit: BPF prog-id=56 op=LOAD May 15 10:38:18.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:18.976000 audit: BPF prog-id=57 op=LOAD May 15 10:38:18.976000 audit: BPF prog-id=34 op=UNLOAD May 15 10:38:18.976000 audit: BPF prog-id=35 op=UNLOAD May 15 10:38:18.993395 systemd[1]: Started kubelet.service. May 15 10:38:18.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.995116 systemd[1]: Stopping kubelet.service... May 15 10:38:18.995415 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:38:18.995601 systemd[1]: Stopped kubelet.service. May 15 10:38:18.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:18.998611 systemd[1]: Starting kubelet.service... May 15 10:38:19.090108 systemd[1]: Started kubelet.service. May 15 10:38:19.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:19.136754 kubelet[1698]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:19.136754 kubelet[1698]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:38:19.136754 kubelet[1698]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:19.137729 kubelet[1698]: I0515 10:38:19.137688 1698 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:38:19.308344 kubelet[1698]: I0515 10:38:19.308292 1698 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 10:38:19.308344 kubelet[1698]: I0515 10:38:19.308325 1698 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:38:19.308575 kubelet[1698]: I0515 10:38:19.308552 1698 server.go:927] "Client rotation is on, will bootstrap in background" May 15 10:38:19.327941 kubelet[1698]: I0515 10:38:19.327897 1698 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:38:19.328487 kubelet[1698]: E0515 10:38:19.328446 1698 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.44:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.336391 kubelet[1698]: I0515 10:38:19.336369 1698 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:38:19.338009 kubelet[1698]: I0515 10:38:19.337974 1698 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:38:19.338175 kubelet[1698]: I0515 10:38:19.338004 1698 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 10:38:19.338560 kubelet[1698]: I0515 10:38:19.338541 1698 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:38:19.338560 kubelet[1698]: I0515 10:38:19.338555 1698 container_manager_linux.go:301] "Creating device plugin manager" May 15 10:38:19.338669 kubelet[1698]: I0515 10:38:19.338650 1698 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:19.339254 kubelet[1698]: I0515 10:38:19.339235 1698 kubelet.go:400] "Attempting to sync node with API server" May 15 10:38:19.339254 kubelet[1698]: I0515 10:38:19.339250 1698 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:38:19.339305 kubelet[1698]: I0515 10:38:19.339268 1698 kubelet.go:312] "Adding apiserver pod source" May 15 10:38:19.339305 kubelet[1698]: I0515 10:38:19.339279 1698 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:38:19.339882 kubelet[1698]: W0515 10:38:19.339839 1698 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.44:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.339933 kubelet[1698]: E0515 10:38:19.339903 1698 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.44:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.340042 kubelet[1698]: W0515 10:38:19.339863 1698 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.340042 kubelet[1698]: E0515 10:38:19.340043 1698 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.342135 kubelet[1698]: I0515 10:38:19.342061 1698 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:38:19.345589 kubelet[1698]: I0515 10:38:19.345568 1698 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:38:19.345653 kubelet[1698]: W0515 10:38:19.345614 1698 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:38:19.346072 kubelet[1698]: I0515 10:38:19.346051 1698 server.go:1264] "Started kubelet" May 15 10:38:19.345000 audit[1698]: AVC avc: denied { mac_admin } for pid=1698 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:19.345000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:19.345000 audit[1698]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c9f230 a1=c000c322d0 a2=c000c9f200 a3=25 items=0 ppid=1 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.345000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:19.345000 audit[1698]: AVC avc: denied { mac_admin } for pid=1698 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:19.345000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:19.345000 audit[1698]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000129620 a1=c000c322e8 a2=c000c9f2c0 a3=25 items=0 ppid=1 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.345000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:19.347279 kubelet[1698]: I0515 10:38:19.346934 1698 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:38:19.347279 kubelet[1698]: I0515 10:38:19.346975 1698 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:38:19.347279 kubelet[1698]: I0515 10:38:19.347021 1698 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:38:19.348000 audit[1710]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1710 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:19.348000 audit[1710]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc6c7b8fa0 a2=0 a3=7ffc6c7b8f8c items=0 ppid=1698 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.348000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:38:19.349000 audit[1711]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1711 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:19.349000 audit[1711]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffefd8a8180 a2=0 a3=7ffefd8a816c items=0 ppid=1698 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:38:19.351338 kubelet[1698]: I0515 10:38:19.351304 1698 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:38:19.352043 kubelet[1698]: I0515 10:38:19.352018 1698 server.go:455] "Adding debug handlers to kubelet server" May 15 10:38:19.355746 kubelet[1698]: I0515 10:38:19.355690 1698 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:38:19.355913 kubelet[1698]: I0515 10:38:19.355890 1698 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:38:19.357578 kubelet[1698]: E0515 10:38:19.357452 1698 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.44:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.44:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad18129b6309 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:38:19.346035465 +0000 UTC m=+0.251739378,LastTimestamp:2025-05-15 10:38:19.346035465 +0000 UTC m=+0.251739378,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:38:19.358412 kubelet[1698]: E0515 10:38:19.358384 1698 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.44:6443: connect: connection refused" interval="200ms" May 15 10:38:19.357000 audit[1713]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1713 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:19.357000 audit[1713]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe75ac2e00 a2=0 a3=7ffe75ac2dec items=0 ppid=1698 pid=1713 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:19.359428 kubelet[1698]: I0515 10:38:19.359405 1698 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 10:38:19.359533 kubelet[1698]: I0515 10:38:19.359513 1698 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:38:19.359576 kubelet[1698]: I0515 10:38:19.359563 1698 reconciler.go:26] "Reconciler: start to sync state" May 15 10:38:19.359905 kubelet[1698]: W0515 10:38:19.359853 1698 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.359966 kubelet[1698]: E0515 10:38:19.359912 1698 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.359000 audit[1715]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1715 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:19.359000 audit[1715]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd210b7750 a2=0 a3=7ffd210b773c items=0 ppid=1698 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.359000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:19.361738 kubelet[1698]: I0515 10:38:19.361693 1698 factory.go:221] Registration of the systemd container factory successfully May 15 10:38:19.361869 kubelet[1698]: I0515 10:38:19.361812 1698 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:38:19.362981 kubelet[1698]: I0515 10:38:19.362828 1698 factory.go:221] Registration of the containerd container factory successfully May 15 10:38:19.363280 kubelet[1698]: E0515 10:38:19.363256 1698 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:38:19.367000 audit[1720]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:19.367000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fff63e6b2c0 a2=0 a3=7fff63e6b2ac items=0 ppid=1698 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:38:19.369045 kubelet[1698]: I0515 10:38:19.369011 1698 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:38:19.368000 audit[1722]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:19.368000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff3d47e400 a2=0 a3=7fff3d47e3ec items=0 ppid=1698 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.368000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:38:19.370029 kubelet[1698]: I0515 10:38:19.369897 1698 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:38:19.370029 kubelet[1698]: I0515 10:38:19.369916 1698 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:38:19.370029 kubelet[1698]: I0515 10:38:19.369930 1698 kubelet.go:2337] "Starting kubelet main sync loop" May 15 10:38:19.370029 kubelet[1698]: E0515 10:38:19.369974 1698 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:38:19.369000 audit[1723]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:19.369000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd27669450 a2=0 a3=7ffd2766943c items=0 ppid=1698 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:38:19.369000 audit[1725]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1725 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:19.369000 audit[1725]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0a33d320 a2=0 a3=7ffc0a33d30c items=0 ppid=1698 pid=1725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:38:19.370000 audit[1726]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:19.370000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdddb50b30 a2=0 a3=7ffdddb50b1c items=0 ppid=1698 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:38:19.370000 audit[1727]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1727 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:19.370000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd45359840 a2=0 a3=7ffd4535982c items=0 ppid=1698 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.370000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:38:19.371000 audit[1728]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:19.371000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6f71c7f0 a2=0 a3=7fff6f71c7dc items=0 ppid=1698 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.371000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:38:19.371000 audit[1729]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:19.371000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffed49c4060 a2=0 a3=7ffed49c404c items=0 ppid=1698 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:38:19.372929 kubelet[1698]: W0515 10:38:19.372860 1698 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.372929 kubelet[1698]: E0515 10:38:19.372910 1698 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:19.373469 kubelet[1698]: I0515 10:38:19.373431 1698 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:38:19.373469 kubelet[1698]: I0515 10:38:19.373441 1698 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:38:19.373469 kubelet[1698]: I0515 10:38:19.373455 1698 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:19.458399 kubelet[1698]: I0515 10:38:19.458375 1698 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:38:19.458615 kubelet[1698]: E0515 10:38:19.458587 1698 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.44:6443/api/v1/nodes\": dial tcp 10.0.0.44:6443: connect: connection refused" node="localhost" May 15 10:38:19.470900 kubelet[1698]: E0515 10:38:19.470868 1698 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:38:19.559405 kubelet[1698]: E0515 10:38:19.559373 1698 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.44:6443: connect: connection refused" interval="400ms" May 15 10:38:19.660389 kubelet[1698]: I0515 10:38:19.660268 1698 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:38:19.660682 kubelet[1698]: E0515 10:38:19.660624 1698 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.44:6443/api/v1/nodes\": dial tcp 10.0.0.44:6443: connect: connection refused" node="localhost" May 15 10:38:19.671691 kubelet[1698]: E0515 10:38:19.671660 1698 kubelet.go:2361] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:38:19.774743 kubelet[1698]: I0515 10:38:19.774696 1698 policy_none.go:49] "None policy: Start" May 15 10:38:19.775329 kubelet[1698]: I0515 10:38:19.775303 1698 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:38:19.775329 kubelet[1698]: I0515 10:38:19.775329 1698 state_mem.go:35] "Initializing new in-memory state store" May 15 10:38:19.781767 systemd[1]: Created slice kubepods.slice. May 15 10:38:19.785462 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:38:19.787970 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:38:19.793767 kubelet[1698]: I0515 10:38:19.793734 1698 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:38:19.792000 audit[1698]: AVC avc: denied { mac_admin } for pid=1698 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:19.792000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:19.792000 audit[1698]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d79bc0 a1=c000f82438 a2=c000d79b90 a3=25 items=0 ppid=1 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:19.792000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:19.794036 kubelet[1698]: I0515 10:38:19.793800 1698 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:38:19.794036 kubelet[1698]: I0515 10:38:19.793917 1698 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:38:19.794211 kubelet[1698]: I0515 10:38:19.794194 1698 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:38:19.794961 kubelet[1698]: E0515 10:38:19.794936 1698 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:38:19.961008 kubelet[1698]: E0515 10:38:19.960888 1698 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.44:6443: connect: connection refused" interval="800ms" May 15 10:38:20.062318 kubelet[1698]: I0515 10:38:20.062286 1698 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:38:20.062591 kubelet[1698]: E0515 10:38:20.062545 1698 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.44:6443/api/v1/nodes\": dial tcp 10.0.0.44:6443: connect: connection refused" node="localhost" May 15 10:38:20.072808 kubelet[1698]: I0515 10:38:20.072733 1698 topology_manager.go:215] "Topology Admit Handler" podUID="94560224c892769c26834243b3e01df0" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 10:38:20.073553 kubelet[1698]: I0515 10:38:20.073528 1698 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 10:38:20.074072 kubelet[1698]: I0515 10:38:20.074046 1698 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 10:38:20.081505 systemd[1]: Created slice kubepods-burstable-pod94560224c892769c26834243b3e01df0.slice. May 15 10:38:20.097820 systemd[1]: Created slice kubepods-burstable-podb20b39a8540dba87b5883a6f0f602dba.slice. May 15 10:38:20.100995 systemd[1]: Created slice kubepods-burstable-pod6ece95f10dbffa04b25ec3439a115512.slice. May 15 10:38:20.162438 kubelet[1698]: I0515 10:38:20.162417 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:20.162663 kubelet[1698]: I0515 10:38:20.162444 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:20.162663 kubelet[1698]: I0515 10:38:20.162465 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 10:38:20.162663 kubelet[1698]: I0515 10:38:20.162478 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/94560224c892769c26834243b3e01df0-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"94560224c892769c26834243b3e01df0\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:20.162663 kubelet[1698]: I0515 10:38:20.162493 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/94560224c892769c26834243b3e01df0-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"94560224c892769c26834243b3e01df0\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:20.162663 kubelet[1698]: I0515 10:38:20.162508 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:20.162797 kubelet[1698]: I0515 10:38:20.162523 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:20.162797 kubelet[1698]: I0515 10:38:20.162538 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:20.162797 kubelet[1698]: I0515 10:38:20.162583 1698 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/94560224c892769c26834243b3e01df0-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"94560224c892769c26834243b3e01df0\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:20.396977 kubelet[1698]: E0515 10:38:20.396832 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:20.397419 env[1202]: time="2025-05-15T10:38:20.397374533Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:94560224c892769c26834243b3e01df0,Namespace:kube-system,Attempt:0,}" May 15 10:38:20.399628 kubelet[1698]: E0515 10:38:20.399597 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:20.400053 env[1202]: time="2025-05-15T10:38:20.400015505Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,}" May 15 10:38:20.403370 kubelet[1698]: E0515 10:38:20.403340 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:20.403795 env[1202]: time="2025-05-15T10:38:20.403762922Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,}" May 15 10:38:20.454378 kubelet[1698]: W0515 10:38:20.454329 1698 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:20.454378 kubelet[1698]: E0515 10:38:20.454376 1698 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.44:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:20.458654 kubelet[1698]: W0515 10:38:20.458589 1698 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:20.458654 kubelet[1698]: E0515 10:38:20.458647 1698 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.44:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:20.694504 kubelet[1698]: W0515 10:38:20.694352 1698 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.44:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:20.694504 kubelet[1698]: E0515 10:38:20.694418 1698 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.44:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:20.761856 kubelet[1698]: E0515 10:38:20.761816 1698 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.44:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.44:6443: connect: connection refused" interval="1.6s" May 15 10:38:20.835580 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2500174168.mount: Deactivated successfully. May 15 10:38:20.839474 env[1202]: time="2025-05-15T10:38:20.839431591Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.842913 env[1202]: time="2025-05-15T10:38:20.842872089Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.843938 env[1202]: time="2025-05-15T10:38:20.843912576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.845638 env[1202]: time="2025-05-15T10:38:20.845597521Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.847144 env[1202]: time="2025-05-15T10:38:20.847113817Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.848469 env[1202]: time="2025-05-15T10:38:20.848428408Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.849959 env[1202]: time="2025-05-15T10:38:20.849925982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.851689 env[1202]: time="2025-05-15T10:38:20.851662433Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.853340 env[1202]: time="2025-05-15T10:38:20.853311229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.856618 env[1202]: time="2025-05-15T10:38:20.856587344Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.857523 env[1202]: time="2025-05-15T10:38:20.857501852Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.858671 env[1202]: time="2025-05-15T10:38:20.858648935Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:20.863854 kubelet[1698]: I0515 10:38:20.863828 1698 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:38:20.864236 kubelet[1698]: E0515 10:38:20.864206 1698 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.44:6443/api/v1/nodes\": dial tcp 10.0.0.44:6443: connect: connection refused" node="localhost" May 15 10:38:20.887083 env[1202]: time="2025-05-15T10:38:20.887029792Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:20.887083 env[1202]: time="2025-05-15T10:38:20.887062015Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:20.887083 env[1202]: time="2025-05-15T10:38:20.887071341Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:20.888220 env[1202]: time="2025-05-15T10:38:20.888163083Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:20.888265 env[1202]: time="2025-05-15T10:38:20.888213957Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:20.888265 env[1202]: time="2025-05-15T10:38:20.888226668Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:20.888361 env[1202]: time="2025-05-15T10:38:20.888319242Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9926dd624c0ce4648793c055c656cb9bedae5b76633aa2fcad092366555de484 pid=1759 runtime=io.containerd.runc.v2 May 15 10:38:20.889027 env[1202]: time="2025-05-15T10:38:20.887197851Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2f8ad2aaccf53b2332c36f42d0703929fd17b296c1cfd5831c3703fe934265f9 pid=1742 runtime=io.containerd.runc.v2 May 15 10:38:20.889156 env[1202]: time="2025-05-15T10:38:20.889112728Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:20.889264 env[1202]: time="2025-05-15T10:38:20.889146915Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:20.889359 env[1202]: time="2025-05-15T10:38:20.889252490Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:20.889992 env[1202]: time="2025-05-15T10:38:20.889526294Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/31f31511eb7d001036bd0d0bd49fbf7192cd68f55de58debf77fb11a3aa5ba0d pid=1749 runtime=io.containerd.runc.v2 May 15 10:38:20.902130 kubelet[1698]: W0515 10:38:20.901990 1698 reflector.go:547] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:20.902130 kubelet[1698]: E0515 10:38:20.902037 1698 reflector.go:150] k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.44:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.44:6443: connect: connection refused May 15 10:38:20.948308 systemd[1]: Started cri-containerd-31f31511eb7d001036bd0d0bd49fbf7192cd68f55de58debf77fb11a3aa5ba0d.scope. May 15 10:38:20.949058 systemd[1]: Started cri-containerd-9926dd624c0ce4648793c055c656cb9bedae5b76633aa2fcad092366555de484.scope. May 15 10:38:20.958682 systemd[1]: Started cri-containerd-2f8ad2aaccf53b2332c36f42d0703929fd17b296c1cfd5831c3703fe934265f9.scope. May 15 10:38:20.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.966000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit: BPF prog-id=58 op=LOAD May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1749 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331663331353131656237643030313033366264306430626434396662 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1749 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331663331353131656237643030313033366264306430626434396662 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit: BPF prog-id=59 op=LOAD May 15 10:38:20.969000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000354e60 items=0 ppid=1749 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331663331353131656237643030313033366264306430626434396662 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit: BPF prog-id=60 op=LOAD May 15 10:38:20.969000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000354ea8 items=0 ppid=1749 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331663331353131656237643030313033366264306430626434396662 May 15 10:38:20.969000 audit: BPF prog-id=60 op=UNLOAD May 15 10:38:20.969000 audit: BPF prog-id=59 op=UNLOAD May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { perfmon } for pid=1780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit[1780]: AVC avc: denied { bpf } for pid=1780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.969000 audit: BPF prog-id=61 op=LOAD May 15 10:38:20.969000 audit[1780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003552b8 items=0 ppid=1749 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331663331353131656237643030313033366264306430626434396662 May 15 10:38:20.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.975000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.975000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.978000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.978000 audit: BPF prog-id=62 op=LOAD May 15 10:38:20.980000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.980000 audit[1784]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1742 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.980000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386164326161636366353362323333326333366634326430373033 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1742 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386164326161636366353362323333326333366634326430373033 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit: BPF prog-id=63 op=LOAD May 15 10:38:20.981000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1759 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323664643632346330636534363438373933633035356336353663 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1759 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323664643632346330636534363438373933633035356336353663 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit: BPF prog-id=64 op=LOAD May 15 10:38:20.981000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0002fef60 items=0 ppid=1759 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323664643632346330636534363438373933633035356336353663 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit: BPF prog-id=65 op=LOAD May 15 10:38:20.982000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0002fefa8 items=0 ppid=1759 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323664643632346330636534363438373933633035356336353663 May 15 10:38:20.982000 audit: BPF prog-id=65 op=UNLOAD May 15 10:38:20.982000 audit: BPF prog-id=64 op=UNLOAD May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { perfmon } for pid=1782 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit[1782]: AVC avc: denied { bpf } for pid=1782 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.982000 audit: BPF prog-id=66 op=LOAD May 15 10:38:20.982000 audit[1782]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0002ff3b8 items=0 ppid=1759 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939323664643632346330636534363438373933633035356336353663 May 15 10:38:20.981000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.981000 audit: BPF prog-id=67 op=LOAD May 15 10:38:20.981000 audit[1784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a6ce0 items=0 ppid=1742 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.981000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386164326161636366353362323333326333366634326430373033 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.984000 audit: BPF prog-id=68 op=LOAD May 15 10:38:20.984000 audit[1784]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a6d28 items=0 ppid=1742 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386164326161636366353362323333326333366634326430373033 May 15 10:38:20.984000 audit: BPF prog-id=68 op=UNLOAD May 15 10:38:20.984000 audit: BPF prog-id=67 op=UNLOAD May 15 10:38:20.985000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { perfmon } for pid=1784 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit[1784]: AVC avc: denied { bpf } for pid=1784 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:20.985000 audit: BPF prog-id=69 op=LOAD May 15 10:38:20.985000 audit[1784]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a7138 items=0 ppid=1742 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:20.985000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266386164326161636366353362323333326333366634326430373033 May 15 10:38:20.996470 env[1202]: time="2025-05-15T10:38:20.996412502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b20b39a8540dba87b5883a6f0f602dba,Namespace:kube-system,Attempt:0,} returns sandbox id \"31f31511eb7d001036bd0d0bd49fbf7192cd68f55de58debf77fb11a3aa5ba0d\"" May 15 10:38:20.997425 kubelet[1698]: E0515 10:38:20.997393 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:21.000366 env[1202]: time="2025-05-15T10:38:21.000336743Z" level=info msg="CreateContainer within sandbox \"31f31511eb7d001036bd0d0bd49fbf7192cd68f55de58debf77fb11a3aa5ba0d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:38:21.008478 env[1202]: time="2025-05-15T10:38:21.008427205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:94560224c892769c26834243b3e01df0,Namespace:kube-system,Attempt:0,} returns sandbox id \"2f8ad2aaccf53b2332c36f42d0703929fd17b296c1cfd5831c3703fe934265f9\"" May 15 10:38:21.008990 kubelet[1698]: E0515 10:38:21.008962 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:21.010893 env[1202]: time="2025-05-15T10:38:21.010861980Z" level=info msg="CreateContainer within sandbox \"2f8ad2aaccf53b2332c36f42d0703929fd17b296c1cfd5831c3703fe934265f9\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:38:21.011291 env[1202]: time="2025-05-15T10:38:21.011257077Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:6ece95f10dbffa04b25ec3439a115512,Namespace:kube-system,Attempt:0,} returns sandbox id \"9926dd624c0ce4648793c055c656cb9bedae5b76633aa2fcad092366555de484\"" May 15 10:38:21.011681 kubelet[1698]: E0515 10:38:21.011664 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:21.016362 env[1202]: time="2025-05-15T10:38:21.013810893Z" level=info msg="CreateContainer within sandbox \"9926dd624c0ce4648793c055c656cb9bedae5b76633aa2fcad092366555de484\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:38:21.027684 env[1202]: time="2025-05-15T10:38:21.027642796Z" level=info msg="CreateContainer within sandbox \"31f31511eb7d001036bd0d0bd49fbf7192cd68f55de58debf77fb11a3aa5ba0d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5bf2cc7946b6a3383952be804ac114231d305f7f9c1ae1184ed45b6714a627de\"" May 15 10:38:21.028399 env[1202]: time="2025-05-15T10:38:21.028371835Z" level=info msg="StartContainer for \"5bf2cc7946b6a3383952be804ac114231d305f7f9c1ae1184ed45b6714a627de\"" May 15 10:38:21.035274 env[1202]: time="2025-05-15T10:38:21.035248671Z" level=info msg="CreateContainer within sandbox \"2f8ad2aaccf53b2332c36f42d0703929fd17b296c1cfd5831c3703fe934265f9\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"331d1276eade9f92d035942834ac6d71bc1d63193b256c78e4cf7bdbc7d73eff\"" May 15 10:38:21.035802 env[1202]: time="2025-05-15T10:38:21.035784304Z" level=info msg="StartContainer for \"331d1276eade9f92d035942834ac6d71bc1d63193b256c78e4cf7bdbc7d73eff\"" May 15 10:38:21.043514 systemd[1]: Started cri-containerd-5bf2cc7946b6a3383952be804ac114231d305f7f9c1ae1184ed45b6714a627de.scope. May 15 10:38:21.045979 env[1202]: time="2025-05-15T10:38:21.045936944Z" level=info msg="CreateContainer within sandbox \"9926dd624c0ce4648793c055c656cb9bedae5b76633aa2fcad092366555de484\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"173bd048ef6ed48a3bb9004be08c087e4d8bb3d39d5e369343994d64f934c5bf\"" May 15 10:38:21.046395 env[1202]: time="2025-05-15T10:38:21.046358314Z" level=info msg="StartContainer for \"173bd048ef6ed48a3bb9004be08c087e4d8bb3d39d5e369343994d64f934c5bf\"" May 15 10:38:21.053212 systemd[1]: Started cri-containerd-331d1276eade9f92d035942834ac6d71bc1d63193b256c78e4cf7bdbc7d73eff.scope. May 15 10:38:21.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.055000 audit: BPF prog-id=70 op=LOAD May 15 10:38:21.056000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1749 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663263633739343662366133333833393532626538303461633131 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1749 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663263633739343662366133333833393532626538303461633131 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.056000 audit: BPF prog-id=71 op=LOAD May 15 10:38:21.056000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001dfe70 items=0 ppid=1749 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663263633739343662366133333833393532626538303461633131 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit: BPF prog-id=72 op=LOAD May 15 10:38:21.059000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001dfeb8 items=0 ppid=1749 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663263633739343662366133333833393532626538303461633131 May 15 10:38:21.059000 audit: BPF prog-id=72 op=UNLOAD May 15 10:38:21.059000 audit: BPF prog-id=71 op=UNLOAD May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { perfmon } for pid=1860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit[1860]: AVC avc: denied { bpf } for pid=1860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.059000 audit: BPF prog-id=73 op=LOAD May 15 10:38:21.059000 audit[1860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0004042c8 items=0 ppid=1749 pid=1860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663263633739343662366133333833393532626538303461633131 May 15 10:38:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.090000 audit: BPF prog-id=74 op=LOAD May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1742 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316431323736656164653966393264303335393432383334616336 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1742 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316431323736656164653966393264303335393432383334616336 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit: BPF prog-id=75 op=LOAD May 15 10:38:21.091000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00028b540 items=0 ppid=1742 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316431323736656164653966393264303335393432383334616336 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit: BPF prog-id=76 op=LOAD May 15 10:38:21.091000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00028b588 items=0 ppid=1742 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316431323736656164653966393264303335393432383334616336 May 15 10:38:21.091000 audit: BPF prog-id=76 op=UNLOAD May 15 10:38:21.091000 audit: BPF prog-id=75 op=UNLOAD May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { perfmon } for pid=1876 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit[1876]: AVC avc: denied { bpf } for pid=1876 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.091000 audit: BPF prog-id=77 op=LOAD May 15 10:38:21.091000 audit[1876]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00028b998 items=0 ppid=1742 pid=1876 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333316431323736656164653966393264303335393432383334616336 May 15 10:38:21.103829 systemd[1]: Started cri-containerd-173bd048ef6ed48a3bb9004be08c087e4d8bb3d39d5e369343994d64f934c5bf.scope. May 15 10:38:21.118839 env[1202]: time="2025-05-15T10:38:21.118791071Z" level=info msg="StartContainer for \"5bf2cc7946b6a3383952be804ac114231d305f7f9c1ae1184ed45b6714a627de\" returns successfully" May 15 10:38:21.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.124000 audit: BPF prog-id=78 op=LOAD May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1759 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.126281 env[1202]: time="2025-05-15T10:38:21.125708645Z" level=info msg="StartContainer for \"331d1276eade9f92d035942834ac6d71bc1d63193b256c78e4cf7bdbc7d73eff\" returns successfully" May 15 10:38:21.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137336264303438656636656434386133626239303034626530386330 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1759 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137336264303438656636656434386133626239303034626530386330 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit: BPF prog-id=79 op=LOAD May 15 10:38:21.125000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d9c00 items=0 ppid=1759 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137336264303438656636656434386133626239303034626530386330 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit: BPF prog-id=80 op=LOAD May 15 10:38:21.125000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d9c48 items=0 ppid=1759 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137336264303438656636656434386133626239303034626530386330 May 15 10:38:21.125000 audit: BPF prog-id=80 op=UNLOAD May 15 10:38:21.125000 audit: BPF prog-id=79 op=UNLOAD May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:21.125000 audit: BPF prog-id=81 op=LOAD May 15 10:38:21.125000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000338058 items=0 ppid=1759 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:21.125000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3137336264303438656636656434386133626239303034626530386330 May 15 10:38:21.152565 env[1202]: time="2025-05-15T10:38:21.152519794Z" level=info msg="StartContainer for \"173bd048ef6ed48a3bb9004be08c087e4d8bb3d39d5e369343994d64f934c5bf\" returns successfully" May 15 10:38:21.377850 kubelet[1698]: E0515 10:38:21.377740 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:21.380338 kubelet[1698]: E0515 10:38:21.380316 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:21.382022 kubelet[1698]: E0515 10:38:21.382002 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:21.925000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:21.925000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c00035a900 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:21.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:21.925000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:21.925000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bbe220 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:21.925000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:22.384261 kubelet[1698]: E0515 10:38:22.384157 1698 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:22.422000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:22.422000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003acc000 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:38:22.422000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:22.422000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:22.422000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c005f08cf0 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:38:22.422000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:22.422000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:22.422000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0073d0000 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:38:22.422000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:22.422000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:22.422000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003bb2150 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:38:22.422000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:22.427000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:22.427000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c006d98260 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:38:22.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:22.427000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:22.427000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7c a1=c004e902d0 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:38:22.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:38:22.456202 kubelet[1698]: E0515 10:38:22.456157 1698 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 10:38:22.465355 kubelet[1698]: I0515 10:38:22.465324 1698 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:38:22.573054 kubelet[1698]: I0515 10:38:22.573011 1698 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 10:38:22.581415 kubelet[1698]: E0515 10:38:22.581364 1698 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:22.682156 kubelet[1698]: E0515 10:38:22.682026 1698 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:22.782666 kubelet[1698]: E0515 10:38:22.782598 1698 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:23.341721 kubelet[1698]: I0515 10:38:23.341667 1698 apiserver.go:52] "Watching apiserver" May 15 10:38:23.359741 kubelet[1698]: I0515 10:38:23.359713 1698 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:38:24.522934 systemd[1]: Reloading. May 15 10:38:24.587259 /usr/lib/systemd/system-generators/torcx-generator[1993]: time="2025-05-15T10:38:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:24.587298 /usr/lib/systemd/system-generators/torcx-generator[1993]: time="2025-05-15T10:38:24Z" level=info msg="torcx already run" May 15 10:38:24.648701 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:24.648717 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:24.666373 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:24.745037 kernel: kauditd_printk_skb: 585 callbacks suppressed May 15 10:38:24.745211 kernel: audit: type=1400 audit(1747305504.734:550): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.745234 kernel: audit: type=1400 audit(1747305504.734:551): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.745253 kernel: audit: type=1400 audit(1747305504.734:552): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751234 kernel: audit: type=1400 audit(1747305504.734:553): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751370 kernel: audit: type=1400 audit(1747305504.734:554): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751388 kernel: audit: type=1400 audit(1747305504.734:555): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.757109 kernel: audit: type=1400 audit(1747305504.734:556): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.757151 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:38:24.757172 kernel: audit: type=1400 audit(1747305504.734:557): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.760990 kernel: audit: audit_lost=4 audit_rate_limit=0 audit_backlog_limit=64 May 15 10:38:24.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.738000 audit: BPF prog-id=82 op=LOAD May 15 10:38:24.738000 audit: BPF prog-id=70 op=UNLOAD May 15 10:38:24.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit: BPF prog-id=83 op=LOAD May 15 10:38:24.741000 audit: BPF prog-id=43 op=UNLOAD May 15 10:38:24.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit: BPF prog-id=84 op=LOAD May 15 10:38:24.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit: BPF prog-id=85 op=LOAD May 15 10:38:24.744000 audit: BPF prog-id=44 op=UNLOAD May 15 10:38:24.744000 audit: BPF prog-id=45 op=UNLOAD May 15 10:38:24.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.750000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.750000 audit: BPF prog-id=86 op=LOAD May 15 10:38:24.750000 audit: BPF prog-id=63 op=UNLOAD May 15 10:38:24.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.751000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.753000 audit: BPF prog-id=87 op=LOAD May 15 10:38:24.753000 audit: BPF prog-id=62 op=UNLOAD May 15 10:38:24.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit: BPF prog-id=88 op=LOAD May 15 10:38:24.761000 audit: BPF prog-id=46 op=UNLOAD May 15 10:38:24.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.761000 audit: BPF prog-id=89 op=LOAD May 15 10:38:24.761000 audit: BPF prog-id=47 op=UNLOAD May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit: BPF prog-id=90 op=LOAD May 15 10:38:24.762000 audit: BPF prog-id=48 op=UNLOAD May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit: BPF prog-id=91 op=LOAD May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.762000 audit: BPF prog-id=92 op=LOAD May 15 10:38:24.762000 audit: BPF prog-id=49 op=UNLOAD May 15 10:38:24.762000 audit: BPF prog-id=50 op=UNLOAD May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit: BPF prog-id=93 op=LOAD May 15 10:38:24.763000 audit: BPF prog-id=58 op=UNLOAD May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit: BPF prog-id=94 op=LOAD May 15 10:38:24.764000 audit: BPF prog-id=51 op=UNLOAD May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit: BPF prog-id=95 op=LOAD May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit: BPF prog-id=96 op=LOAD May 15 10:38:24.764000 audit: BPF prog-id=52 op=UNLOAD May 15 10:38:24.764000 audit: BPF prog-id=53 op=UNLOAD May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.764000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit: BPF prog-id=97 op=LOAD May 15 10:38:24.765000 audit: BPF prog-id=54 op=UNLOAD May 15 10:38:24.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.765000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit: BPF prog-id=98 op=LOAD May 15 10:38:24.766000 audit: BPF prog-id=74 op=UNLOAD May 15 10:38:24.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit: BPF prog-id=99 op=LOAD May 15 10:38:24.767000 audit: BPF prog-id=55 op=UNLOAD May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit: BPF prog-id=100 op=LOAD May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.767000 audit: BPF prog-id=101 op=LOAD May 15 10:38:24.767000 audit: BPF prog-id=56 op=UNLOAD May 15 10:38:24.767000 audit: BPF prog-id=57 op=UNLOAD May 15 10:38:24.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.768000 audit: BPF prog-id=102 op=LOAD May 15 10:38:24.768000 audit: BPF prog-id=78 op=UNLOAD May 15 10:38:24.779269 systemd[1]: Stopping kubelet.service... May 15 10:38:24.779498 kubelet[1698]: E0515 10:38:24.779197 1698 event.go:319] "Unable to write event (broadcaster is shut down)" event="&Event{ObjectMeta:{localhost.183fad18129b6309 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:38:19.346035465 +0000 UTC m=+0.251739378,LastTimestamp:2025-05-15 10:38:19.346035465 +0000 UTC m=+0.251739378,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:38:24.806332 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:38:24.806488 systemd[1]: Stopped kubelet.service. May 15 10:38:24.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:24.807914 systemd[1]: Starting kubelet.service... May 15 10:38:24.883416 systemd[1]: Started kubelet.service. May 15 10:38:24.882000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:24.927557 kubelet[2038]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:24.927557 kubelet[2038]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:38:24.927557 kubelet[2038]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:24.927557 kubelet[2038]: I0515 10:38:24.926525 2038 server.go:205] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:38:24.931757 kubelet[2038]: I0515 10:38:24.931719 2038 server.go:484] "Kubelet version" kubeletVersion="v1.30.1" May 15 10:38:24.931757 kubelet[2038]: I0515 10:38:24.931746 2038 server.go:486] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:38:24.932116 kubelet[2038]: I0515 10:38:24.932071 2038 server.go:927] "Client rotation is on, will bootstrap in background" May 15 10:38:24.934350 kubelet[2038]: I0515 10:38:24.934327 2038 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:38:24.935418 kubelet[2038]: I0515 10:38:24.935378 2038 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:38:24.941621 kubelet[2038]: I0515 10:38:24.941598 2038 server.go:742] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:38:24.941831 kubelet[2038]: I0515 10:38:24.941798 2038 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:38:24.941990 kubelet[2038]: I0515 10:38:24.941823 2038 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} May 15 10:38:24.942108 kubelet[2038]: I0515 10:38:24.941993 2038 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:38:24.942108 kubelet[2038]: I0515 10:38:24.942001 2038 container_manager_linux.go:301] "Creating device plugin manager" May 15 10:38:24.942108 kubelet[2038]: I0515 10:38:24.942037 2038 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:24.942177 kubelet[2038]: I0515 10:38:24.942140 2038 kubelet.go:400] "Attempting to sync node with API server" May 15 10:38:24.942177 kubelet[2038]: I0515 10:38:24.942154 2038 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:38:24.942177 kubelet[2038]: I0515 10:38:24.942172 2038 kubelet.go:312] "Adding apiserver pod source" May 15 10:38:24.942239 kubelet[2038]: I0515 10:38:24.942186 2038 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:38:24.943000 kubelet[2038]: I0515 10:38:24.942984 2038 kuberuntime_manager.go:261] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:38:24.943265 kubelet[2038]: I0515 10:38:24.943251 2038 kubelet.go:815] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:38:24.943708 kubelet[2038]: I0515 10:38:24.943696 2038 server.go:1264] "Started kubelet" May 15 10:38:24.944000 audit[2038]: AVC avc: denied { mac_admin } for pid=2038 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.944000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:24.944000 audit[2038]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007ffe90 a1=c000aac840 a2=c0007ffe60 a3=25 items=0 ppid=1 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:24.944000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:24.945754 kubelet[2038]: I0515 10:38:24.945732 2038 kubelet.go:1419] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:38:24.944000 audit[2038]: AVC avc: denied { mac_admin } for pid=2038 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.944000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:24.944000 audit[2038]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ab5500 a1=c0007b7128 a2=c000bb2fc0 a3=25 items=0 ppid=1 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:24.944000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:24.946385 kubelet[2038]: I0515 10:38:24.946352 2038 kubelet.go:1423] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:38:24.946468 kubelet[2038]: I0515 10:38:24.946455 2038 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:38:24.947790 kubelet[2038]: I0515 10:38:24.947758 2038 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:38:24.949233 kubelet[2038]: I0515 10:38:24.949212 2038 server.go:455] "Adding debug handlers to kubelet server" May 15 10:38:24.950806 kubelet[2038]: I0515 10:38:24.950762 2038 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:38:24.950941 kubelet[2038]: I0515 10:38:24.950920 2038 server.go:227] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:38:24.953533 kubelet[2038]: E0515 10:38:24.953513 2038 kubelet.go:1467] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:38:24.955502 kubelet[2038]: I0515 10:38:24.955479 2038 volume_manager.go:291] "Starting Kubelet Volume Manager" May 15 10:38:24.956025 kubelet[2038]: I0515 10:38:24.956010 2038 desired_state_of_world_populator.go:149] "Desired state populator starts to run" May 15 10:38:24.956371 kubelet[2038]: I0515 10:38:24.956360 2038 reconciler.go:26] "Reconciler: start to sync state" May 15 10:38:24.960918 kubelet[2038]: I0515 10:38:24.959325 2038 factory.go:221] Registration of the systemd container factory successfully May 15 10:38:24.960918 kubelet[2038]: I0515 10:38:24.959412 2038 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:38:24.960918 kubelet[2038]: I0515 10:38:24.960453 2038 factory.go:221] Registration of the containerd container factory successfully May 15 10:38:24.969290 kubelet[2038]: I0515 10:38:24.969263 2038 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:38:24.970482 kubelet[2038]: I0515 10:38:24.970468 2038 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:38:24.970574 kubelet[2038]: I0515 10:38:24.970558 2038 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:38:24.970660 kubelet[2038]: I0515 10:38:24.970647 2038 kubelet.go:2337] "Starting kubelet main sync loop" May 15 10:38:24.970778 kubelet[2038]: E0515 10:38:24.970759 2038 kubelet.go:2361] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:38:24.984201 kubelet[2038]: I0515 10:38:24.984176 2038 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:38:24.984201 kubelet[2038]: I0515 10:38:24.984191 2038 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:38:24.984201 kubelet[2038]: I0515 10:38:24.984205 2038 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:24.984362 kubelet[2038]: I0515 10:38:24.984315 2038 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:38:24.984362 kubelet[2038]: I0515 10:38:24.984323 2038 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:38:24.984362 kubelet[2038]: I0515 10:38:24.984339 2038 policy_none.go:49] "None policy: Start" May 15 10:38:24.984815 kubelet[2038]: I0515 10:38:24.984798 2038 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:38:24.984864 kubelet[2038]: I0515 10:38:24.984820 2038 state_mem.go:35] "Initializing new in-memory state store" May 15 10:38:24.984969 kubelet[2038]: I0515 10:38:24.984955 2038 state_mem.go:75] "Updated machine memory state" May 15 10:38:24.988150 kubelet[2038]: I0515 10:38:24.988126 2038 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:38:24.987000 audit[2038]: AVC avc: denied { mac_admin } for pid=2038 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:24.987000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:24.987000 audit[2038]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d4e600 a1=c000f9d0b0 a2=c000d4e5d0 a3=25 items=0 ppid=1 pid=2038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:24.987000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:24.988372 kubelet[2038]: I0515 10:38:24.988180 2038 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:38:24.988372 kubelet[2038]: I0515 10:38:24.988287 2038 container_log_manager.go:186] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:38:24.988372 kubelet[2038]: I0515 10:38:24.988352 2038 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:38:25.059320 kubelet[2038]: I0515 10:38:25.059206 2038 kubelet_node_status.go:73] "Attempting to register node" node="localhost" May 15 10:38:25.064757 kubelet[2038]: I0515 10:38:25.064734 2038 kubelet_node_status.go:112] "Node was previously registered" node="localhost" May 15 10:38:25.064832 kubelet[2038]: I0515 10:38:25.064793 2038 kubelet_node_status.go:76] "Successfully registered node" node="localhost" May 15 10:38:25.071863 kubelet[2038]: I0515 10:38:25.071820 2038 topology_manager.go:215] "Topology Admit Handler" podUID="94560224c892769c26834243b3e01df0" podNamespace="kube-system" podName="kube-apiserver-localhost" May 15 10:38:25.072006 kubelet[2038]: I0515 10:38:25.071913 2038 topology_manager.go:215] "Topology Admit Handler" podUID="b20b39a8540dba87b5883a6f0f602dba" podNamespace="kube-system" podName="kube-controller-manager-localhost" May 15 10:38:25.072006 kubelet[2038]: I0515 10:38:25.071963 2038 topology_manager.go:215] "Topology Admit Handler" podUID="6ece95f10dbffa04b25ec3439a115512" podNamespace="kube-system" podName="kube-scheduler-localhost" May 15 10:38:25.157686 kubelet[2038]: I0515 10:38:25.157632 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/94560224c892769c26834243b3e01df0-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"94560224c892769c26834243b3e01df0\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:25.157686 kubelet[2038]: I0515 10:38:25.157674 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/94560224c892769c26834243b3e01df0-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"94560224c892769c26834243b3e01df0\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:25.157686 kubelet[2038]: I0515 10:38:25.157692 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:25.157904 kubelet[2038]: I0515 10:38:25.157704 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:25.157904 kubelet[2038]: I0515 10:38:25.157721 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:25.157904 kubelet[2038]: I0515 10:38:25.157733 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:25.157904 kubelet[2038]: I0515 10:38:25.157745 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6ece95f10dbffa04b25ec3439a115512-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"6ece95f10dbffa04b25ec3439a115512\") " pod="kube-system/kube-scheduler-localhost" May 15 10:38:25.157904 kubelet[2038]: I0515 10:38:25.157757 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/94560224c892769c26834243b3e01df0-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"94560224c892769c26834243b3e01df0\") " pod="kube-system/kube-apiserver-localhost" May 15 10:38:25.158017 kubelet[2038]: I0515 10:38:25.157770 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b20b39a8540dba87b5883a6f0f602dba-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b20b39a8540dba87b5883a6f0f602dba\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:38:25.382541 kubelet[2038]: E0515 10:38:25.382430 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:25.383006 kubelet[2038]: E0515 10:38:25.382951 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:25.383256 kubelet[2038]: E0515 10:38:25.383240 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:25.942933 kubelet[2038]: I0515 10:38:25.942881 2038 apiserver.go:52] "Watching apiserver" May 15 10:38:25.956433 kubelet[2038]: I0515 10:38:25.956411 2038 desired_state_of_world_populator.go:157] "Finished populating initial desired state of world" May 15 10:38:25.981017 kubelet[2038]: E0515 10:38:25.980970 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:25.981860 kubelet[2038]: E0515 10:38:25.981826 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:25.987175 kubelet[2038]: E0515 10:38:25.987123 2038 kubelet.go:1928] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:38:25.987581 kubelet[2038]: E0515 10:38:25.987562 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:26.002218 kubelet[2038]: I0515 10:38:26.002142 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.002119655 podStartE2EDuration="1.002119655s" podCreationTimestamp="2025-05-15 10:38:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:38:25.995017088 +0000 UTC m=+1.108277731" watchObservedRunningTime="2025-05-15 10:38:26.002119655 +0000 UTC m=+1.115380298" May 15 10:38:26.001000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:38:26.001000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000ca4540 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:26.001000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:26.008246 kubelet[2038]: I0515 10:38:26.008197 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.008176006 podStartE2EDuration="1.008176006s" podCreationTimestamp="2025-05-15 10:38:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:38:26.002083317 +0000 UTC m=+1.115343990" watchObservedRunningTime="2025-05-15 10:38:26.008176006 +0000 UTC m=+1.121436649" May 15 10:38:26.008363 kubelet[2038]: I0515 10:38:26.008326 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.008323091 podStartE2EDuration="1.008323091s" podCreationTimestamp="2025-05-15 10:38:25 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:38:26.008154847 +0000 UTC m=+1.121415480" watchObservedRunningTime="2025-05-15 10:38:26.008323091 +0000 UTC m=+1.121583734" May 15 10:38:26.981913 kubelet[2038]: E0515 10:38:26.981877 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:29.990242 kubelet[2038]: E0515 10:38:29.990208 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:30.224077 sudo[1340]: pam_unix(sudo:session): session closed for user root May 15 10:38:30.223000 audit[1340]: USER_END pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:30.225251 kernel: kauditd_printk_skb: 253 callbacks suppressed May 15 10:38:30.225307 kernel: audit: type=1106 audit(1747305510.223:799): pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:30.226411 sshd[1337]: pam_unix(sshd:session): session closed for user core May 15 10:38:30.223000 audit[1340]: CRED_DISP pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:30.228359 systemd[1]: sshd@6-10.0.0.44:22-10.0.0.1:53140.service: Deactivated successfully. May 15 10:38:30.229119 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:38:30.229258 systemd[1]: session-7.scope: Consumed 4.584s CPU time. May 15 10:38:30.230011 systemd-logind[1192]: Session 7 logged out. Waiting for processes to exit. May 15 10:38:30.230799 systemd-logind[1192]: Removed session 7. May 15 10:38:30.233108 kernel: audit: type=1104 audit(1747305510.223:800): pid=1340 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:30.233171 kernel: audit: type=1106 audit(1747305510.225:801): pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:30.225000 audit[1337]: USER_END pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:30.225000 audit[1337]: CRED_DISP pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:30.240757 kernel: audit: type=1104 audit(1747305510.225:802): pid=1337 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:30.240800 kernel: audit: type=1131 audit(1747305510.225:803): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.44:22-10.0.0.1:53140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.44:22-10.0.0.1:53140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:32.497249 kubelet[2038]: E0515 10:38:32.497208 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:32.988882 kubelet[2038]: E0515 10:38:32.988746 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:35.666264 kubelet[2038]: E0515 10:38:35.666225 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:35.992709 kubelet[2038]: E0515 10:38:35.992683 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:36.111902 update_engine[1194]: I0515 10:38:36.111838 1194 update_attempter.cc:509] Updating boot flags... May 15 10:38:37.732000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:37.732000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001309400 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:37.743721 kernel: audit: type=1400 audit(1747305517.732:804): avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:37.743818 kernel: audit: type=1300 audit(1747305517.732:804): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001309400 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:37.751127 kernel: audit: type=1327 audit(1747305517.732:804): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:37.751263 kernel: audit: type=1400 audit(1747305517.732:805): avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:37.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:37.732000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:37.733000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:37.756555 kernel: audit: type=1400 audit(1747305517.733:806): avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:37.756723 kernel: audit: type=1400 audit(1747305517.733:807): avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:37.733000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:38:37.760241 kernel: audit: type=1300 audit(1747305517.733:806): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013cf6e0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:37.733000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0013cf6e0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:37.733000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:37.769550 kernel: audit: type=1327 audit(1747305517.733:806): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:37.769628 kernel: audit: type=1300 audit(1747305517.733:807): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012bfaa0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:37.733000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012bfaa0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:37.774472 kernel: audit: type=1327 audit(1747305517.733:807): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:37.733000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:37.732000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0013095c0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:38:37.732000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:38:39.340086 kubelet[2038]: I0515 10:38:39.340047 2038 kuberuntime_manager.go:1523] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:38:39.340559 env[1202]: time="2025-05-15T10:38:39.340507183Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:38:39.340766 kubelet[2038]: I0515 10:38:39.340740 2038 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:38:39.986763 kubelet[2038]: I0515 10:38:39.986716 2038 topology_manager.go:215] "Topology Admit Handler" podUID="37e7a06c-893d-4b8c-8a36-ab2a5d6ec29d" podNamespace="tigera-operator" podName="tigera-operator-797db67f8-f5wt4" May 15 10:38:39.992271 systemd[1]: Created slice kubepods-besteffort-pod37e7a06c_893d_4b8c_8a36_ab2a5d6ec29d.slice. May 15 10:38:39.993871 kubelet[2038]: E0515 10:38:39.993840 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:40.063930 kubelet[2038]: I0515 10:38:40.063890 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/37e7a06c-893d-4b8c-8a36-ab2a5d6ec29d-var-lib-calico\") pod \"tigera-operator-797db67f8-f5wt4\" (UID: \"37e7a06c-893d-4b8c-8a36-ab2a5d6ec29d\") " pod="tigera-operator/tigera-operator-797db67f8-f5wt4" May 15 10:38:40.063930 kubelet[2038]: I0515 10:38:40.063923 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rh5bd\" (UniqueName: \"kubernetes.io/projected/37e7a06c-893d-4b8c-8a36-ab2a5d6ec29d-kube-api-access-rh5bd\") pod \"tigera-operator-797db67f8-f5wt4\" (UID: \"37e7a06c-893d-4b8c-8a36-ab2a5d6ec29d\") " pod="tigera-operator/tigera-operator-797db67f8-f5wt4" May 15 10:38:40.170404 kubelet[2038]: I0515 10:38:40.170361 2038 topology_manager.go:215] "Topology Admit Handler" podUID="40aa714e-0340-4f03-afb2-c082d9773687" podNamespace="kube-system" podName="kube-proxy-vv5db" May 15 10:38:40.180963 systemd[1]: Created slice kubepods-besteffort-pod40aa714e_0340_4f03_afb2_c082d9773687.slice. May 15 10:38:40.264848 kubelet[2038]: I0515 10:38:40.264724 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/40aa714e-0340-4f03-afb2-c082d9773687-kube-proxy\") pod \"kube-proxy-vv5db\" (UID: \"40aa714e-0340-4f03-afb2-c082d9773687\") " pod="kube-system/kube-proxy-vv5db" May 15 10:38:40.264848 kubelet[2038]: I0515 10:38:40.264771 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/40aa714e-0340-4f03-afb2-c082d9773687-xtables-lock\") pod \"kube-proxy-vv5db\" (UID: \"40aa714e-0340-4f03-afb2-c082d9773687\") " pod="kube-system/kube-proxy-vv5db" May 15 10:38:40.264848 kubelet[2038]: I0515 10:38:40.264794 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ck79q\" (UniqueName: \"kubernetes.io/projected/40aa714e-0340-4f03-afb2-c082d9773687-kube-api-access-ck79q\") pod \"kube-proxy-vv5db\" (UID: \"40aa714e-0340-4f03-afb2-c082d9773687\") " pod="kube-system/kube-proxy-vv5db" May 15 10:38:40.264848 kubelet[2038]: I0515 10:38:40.264818 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/40aa714e-0340-4f03-afb2-c082d9773687-lib-modules\") pod \"kube-proxy-vv5db\" (UID: \"40aa714e-0340-4f03-afb2-c082d9773687\") " pod="kube-system/kube-proxy-vv5db" May 15 10:38:40.300525 env[1202]: time="2025-05-15T10:38:40.300469264Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-f5wt4,Uid:37e7a06c-893d-4b8c-8a36-ab2a5d6ec29d,Namespace:tigera-operator,Attempt:0,}" May 15 10:38:40.322353 env[1202]: time="2025-05-15T10:38:40.322292198Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:40.322353 env[1202]: time="2025-05-15T10:38:40.322329397Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:40.322353 env[1202]: time="2025-05-15T10:38:40.322341891Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:40.322583 env[1202]: time="2025-05-15T10:38:40.322458379Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/73f2dac95a61a61f6ece79abb20e4534b8ac96bf0092e6918c0f5beb9845f0b5 pid=2148 runtime=io.containerd.runc.v2 May 15 10:38:40.336630 systemd[1]: Started cri-containerd-73f2dac95a61a61f6ece79abb20e4534b8ac96bf0092e6918c0f5beb9845f0b5.scope. May 15 10:38:40.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit: BPF prog-id=103 op=LOAD May 15 10:38:40.345000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=2148 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663264616339356136316136316636656365373961626232306534 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=c items=0 ppid=2148 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663264616339356136316136316636656365373961626232306534 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.345000 audit: BPF prog-id=104 op=LOAD May 15 10:38:40.345000 audit[2157]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001c63a0 items=0 ppid=2148 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.345000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663264616339356136316136316636656365373961626232306534 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit: BPF prog-id=105 op=LOAD May 15 10:38:40.346000 audit[2157]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001c63e8 items=0 ppid=2148 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663264616339356136316136316636656365373961626232306534 May 15 10:38:40.346000 audit: BPF prog-id=105 op=UNLOAD May 15 10:38:40.346000 audit: BPF prog-id=104 op=UNLOAD May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { perfmon } for pid=2157 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit[2157]: AVC avc: denied { bpf } for pid=2157 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.346000 audit: BPF prog-id=106 op=LOAD May 15 10:38:40.346000 audit[2157]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001c67f8 items=0 ppid=2148 pid=2157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663264616339356136316136316636656365373961626232306534 May 15 10:38:40.370763 env[1202]: time="2025-05-15T10:38:40.370714795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-797db67f8-f5wt4,Uid:37e7a06c-893d-4b8c-8a36-ab2a5d6ec29d,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"73f2dac95a61a61f6ece79abb20e4534b8ac96bf0092e6918c0f5beb9845f0b5\"" May 15 10:38:40.373760 env[1202]: time="2025-05-15T10:38:40.373722099Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:38:40.483709 kubelet[2038]: E0515 10:38:40.483667 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:40.485281 env[1202]: time="2025-05-15T10:38:40.485241764Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vv5db,Uid:40aa714e-0340-4f03-afb2-c082d9773687,Namespace:kube-system,Attempt:0,}" May 15 10:38:40.500049 env[1202]: time="2025-05-15T10:38:40.499990384Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:40.500049 env[1202]: time="2025-05-15T10:38:40.500028897Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:40.500049 env[1202]: time="2025-05-15T10:38:40.500041410Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:40.500242 env[1202]: time="2025-05-15T10:38:40.500194407Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ecaf4631f2517376612be6791d49ee52c6c3b0437e11ad084b977e313315b7d pid=2188 runtime=io.containerd.runc.v2 May 15 10:38:40.510574 systemd[1]: Started cri-containerd-5ecaf4631f2517376612be6791d49ee52c6c3b0437e11ad084b977e313315b7d.scope. May 15 10:38:40.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.519000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.519000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.520000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.520000 audit: BPF prog-id=107 op=LOAD May 15 10:38:40.521000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.521000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2188 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565636166343633316632353137333736363132626536373931643439 May 15 10:38:40.521000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.521000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2188 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.521000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565636166343633316632353137333736363132626536373931643439 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit: BPF prog-id=108 op=LOAD May 15 10:38:40.522000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000208360 items=0 ppid=2188 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565636166343633316632353137333736363132626536373931643439 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit: BPF prog-id=109 op=LOAD May 15 10:38:40.522000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002083a8 items=0 ppid=2188 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565636166343633316632353137333736363132626536373931643439 May 15 10:38:40.522000 audit: BPF prog-id=109 op=UNLOAD May 15 10:38:40.522000 audit: BPF prog-id=108 op=UNLOAD May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { perfmon } for pid=2197 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit[2197]: AVC avc: denied { bpf } for pid=2197 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.522000 audit: BPF prog-id=110 op=LOAD May 15 10:38:40.522000 audit[2197]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002087b8 items=0 ppid=2188 pid=2197 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565636166343633316632353137333736363132626536373931643439 May 15 10:38:40.534143 env[1202]: time="2025-05-15T10:38:40.533485165Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-vv5db,Uid:40aa714e-0340-4f03-afb2-c082d9773687,Namespace:kube-system,Attempt:0,} returns sandbox id \"5ecaf4631f2517376612be6791d49ee52c6c3b0437e11ad084b977e313315b7d\"" May 15 10:38:40.534302 kubelet[2038]: E0515 10:38:40.534131 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:40.536540 env[1202]: time="2025-05-15T10:38:40.536498550Z" level=info msg="CreateContainer within sandbox \"5ecaf4631f2517376612be6791d49ee52c6c3b0437e11ad084b977e313315b7d\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:38:40.556103 env[1202]: time="2025-05-15T10:38:40.556029461Z" level=info msg="CreateContainer within sandbox \"5ecaf4631f2517376612be6791d49ee52c6c3b0437e11ad084b977e313315b7d\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"99114ce5a87c2aabad1a10e9c4977b9768ba3f3743307eefc4edc5d879267dd7\"" May 15 10:38:40.557646 env[1202]: time="2025-05-15T10:38:40.556741254Z" level=info msg="StartContainer for \"99114ce5a87c2aabad1a10e9c4977b9768ba3f3743307eefc4edc5d879267dd7\"" May 15 10:38:40.571665 systemd[1]: Started cri-containerd-99114ce5a87c2aabad1a10e9c4977b9768ba3f3743307eefc4edc5d879267dd7.scope. May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fcec4db3a88 items=0 ppid=2188 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313134636535613837633261616261643161313065396334393737 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit: BPF prog-id=111 op=LOAD May 15 10:38:40.584000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022d138 items=0 ppid=2188 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313134636535613837633261616261643161313065396334393737 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit: BPF prog-id=112 op=LOAD May 15 10:38:40.584000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022d188 items=0 ppid=2188 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313134636535613837633261616261643161313065396334393737 May 15 10:38:40.584000 audit: BPF prog-id=112 op=UNLOAD May 15 10:38:40.584000 audit: BPF prog-id=111 op=UNLOAD May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { perfmon } for pid=2226 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit[2226]: AVC avc: denied { bpf } for pid=2226 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:40.584000 audit: BPF prog-id=113 op=LOAD May 15 10:38:40.584000 audit[2226]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022d218 items=0 ppid=2188 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.584000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939313134636535613837633261616261643161313065396334393737 May 15 10:38:40.597980 env[1202]: time="2025-05-15T10:38:40.597933525Z" level=info msg="StartContainer for \"99114ce5a87c2aabad1a10e9c4977b9768ba3f3743307eefc4edc5d879267dd7\" returns successfully" May 15 10:38:40.650000 audit[2280]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.650000 audit[2281]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.650000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff854e1100 a2=0 a3=7fff854e10ec items=0 ppid=2237 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.650000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:38:40.650000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea4e86f50 a2=0 a3=7ffea4e86f3c items=0 ppid=2237 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.650000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:38:40.652000 audit[2283]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.652000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdcbaf4270 a2=0 a3=7ffdcbaf425c items=0 ppid=2237 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.652000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:38:40.653000 audit[2284]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2284 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.653000 audit[2284]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1c9b6630 a2=0 a3=7ffd1c9b661c items=0 ppid=2237 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.653000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:38:40.654000 audit[2285]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.654000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdad36c640 a2=0 a3=7ffdad36c62c items=0 ppid=2237 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.654000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:38:40.654000 audit[2286]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.654000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff18968b60 a2=0 a3=7fff18968b4c items=0 ppid=2237 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.654000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:38:40.751000 audit[2287]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2287 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.751000 audit[2287]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd74c4a580 a2=0 a3=7ffd74c4a56c items=0 ppid=2237 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:38:40.754000 audit[2289]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.754000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd7a7f4a00 a2=0 a3=7ffd7a7f49ec items=0 ppid=2237 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:38:40.757000 audit[2292]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2292 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.757000 audit[2292]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb0e12790 a2=0 a3=7ffeb0e1277c items=0 ppid=2237 pid=2292 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.757000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:38:40.758000 audit[2293]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.758000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd424a3a50 a2=0 a3=7ffd424a3a3c items=0 ppid=2237 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:38:40.760000 audit[2295]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.760000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe474d30d0 a2=0 a3=7ffe474d30bc items=0 ppid=2237 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:38:40.761000 audit[2296]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.761000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe8247e440 a2=0 a3=7ffe8247e42c items=0 ppid=2237 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:38:40.763000 audit[2298]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.763000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffff6439e50 a2=0 a3=7ffff6439e3c items=0 ppid=2237 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.763000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:38:40.766000 audit[2301]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.766000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffa8d15c00 a2=0 a3=7fffa8d15bec items=0 ppid=2237 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:38:40.768000 audit[2302]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.768000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9b097850 a2=0 a3=7ffe9b09783c items=0 ppid=2237 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.768000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:38:40.770000 audit[2304]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.770000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc92be2fe0 a2=0 a3=7ffc92be2fcc items=0 ppid=2237 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:38:40.771000 audit[2305]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.771000 audit[2305]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe63b69f80 a2=0 a3=7ffe63b69f6c items=0 ppid=2237 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.771000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:38:40.773000 audit[2307]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.773000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffceb38240 a2=0 a3=7fffceb3822c items=0 ppid=2237 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:38:40.777000 audit[2310]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.777000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd27392a00 a2=0 a3=7ffd273929ec items=0 ppid=2237 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:38:40.780000 audit[2313]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.780000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1e93ba30 a2=0 a3=7ffd1e93ba1c items=0 ppid=2237 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:38:40.781000 audit[2314]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2314 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.781000 audit[2314]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff1968a950 a2=0 a3=7fff1968a93c items=0 ppid=2237 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:38:40.783000 audit[2316]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.783000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe81694f90 a2=0 a3=7ffe81694f7c items=0 ppid=2237 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.783000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:38:40.786000 audit[2319]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.786000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcbf0ad640 a2=0 a3=7ffcbf0ad62c items=0 ppid=2237 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:38:40.787000 audit[2320]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.787000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed570faf0 a2=0 a3=7ffed570fadc items=0 ppid=2237 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.787000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:38:40.789000 audit[2322]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:40.789000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe0e25b440 a2=0 a3=7ffe0e25b42c items=0 ppid=2237 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:38:40.808000 audit[2328]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:40.808000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd1ab2e990 a2=0 a3=7ffd1ab2e97c items=0 ppid=2237 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:40.820000 audit[2328]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:40.820000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd1ab2e990 a2=0 a3=7ffd1ab2e97c items=0 ppid=2237 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.820000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:40.821000 audit[2334]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.821000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffedb5a2070 a2=0 a3=7ffedb5a205c items=0 ppid=2237 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:38:40.823000 audit[2336]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.823000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe5cd431d0 a2=0 a3=7ffe5cd431bc items=0 ppid=2237 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.823000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:38:40.827000 audit[2339]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.827000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc7a95dc40 a2=0 a3=7ffc7a95dc2c items=0 ppid=2237 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:38:40.828000 audit[2340]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.828000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd8105400 a2=0 a3=7ffcd81053ec items=0 ppid=2237 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:38:40.830000 audit[2342]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.830000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcad548dd0 a2=0 a3=7ffcad548dbc items=0 ppid=2237 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:38:40.831000 audit[2343]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.831000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd14212bb0 a2=0 a3=7ffd14212b9c items=0 ppid=2237 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.831000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:38:40.833000 audit[2345]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.833000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe95824770 a2=0 a3=7ffe9582475c items=0 ppid=2237 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:38:40.836000 audit[2348]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2348 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.836000 audit[2348]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffce055500 a2=0 a3=7fffce0554ec items=0 ppid=2237 pid=2348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:38:40.837000 audit[2349]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.837000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc615de8a0 a2=0 a3=7ffc615de88c items=0 ppid=2237 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.837000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:38:40.839000 audit[2351]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.839000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe6a4be230 a2=0 a3=7ffe6a4be21c items=0 ppid=2237 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.839000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:38:40.840000 audit[2352]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.840000 audit[2352]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc393df000 a2=0 a3=7ffc393defec items=0 ppid=2237 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.840000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:38:40.843000 audit[2354]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.843000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe3e58ff50 a2=0 a3=7ffe3e58ff3c items=0 ppid=2237 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.843000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:38:40.846000 audit[2357]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.846000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff99490c40 a2=0 a3=7fff99490c2c items=0 ppid=2237 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.846000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:38:40.849000 audit[2360]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.849000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff1cf1cfc0 a2=0 a3=7fff1cf1cfac items=0 ppid=2237 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.849000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:38:40.850000 audit[2361]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.850000 audit[2361]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff60075140 a2=0 a3=7fff6007512c items=0 ppid=2237 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.850000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:38:40.852000 audit[2363]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.852000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff9ee62410 a2=0 a3=7fff9ee623fc items=0 ppid=2237 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.852000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:38:40.855000 audit[2366]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.855000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffec56d5810 a2=0 a3=7ffec56d57fc items=0 ppid=2237 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.855000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:38:40.856000 audit[2367]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.856000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff90c34540 a2=0 a3=7fff90c3452c items=0 ppid=2237 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.856000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:38:40.858000 audit[2369]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.858000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe8c3d9700 a2=0 a3=7ffe8c3d96ec items=0 ppid=2237 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:38:40.859000 audit[2370]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.859000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc996e8210 a2=0 a3=7ffc996e81fc items=0 ppid=2237 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.859000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:38:40.861000 audit[2372]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.861000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe0c496870 a2=0 a3=7ffe0c49685c items=0 ppid=2237 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.861000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:40.865000 audit[2375]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:40.865000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff3a767370 a2=0 a3=7fff3a76735c items=0 ppid=2237 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.865000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:40.868000 audit[2377]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:38:40.868000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe62b9cf60 a2=0 a3=7ffe62b9cf4c items=0 ppid=2237 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.868000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:40.868000 audit[2377]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2377 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:38:40.868000 audit[2377]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe62b9cf60 a2=0 a3=7ffe62b9cf4c items=0 ppid=2237 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:40.868000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:41.000694 kubelet[2038]: E0515 10:38:41.000621 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:41.011502 kubelet[2038]: I0515 10:38:41.011440 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-vv5db" podStartSLOduration=1.011397998 podStartE2EDuration="1.011397998s" podCreationTimestamp="2025-05-15 10:38:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:38:41.011254449 +0000 UTC m=+16.124515102" watchObservedRunningTime="2025-05-15 10:38:41.011397998 +0000 UTC m=+16.124658641" May 15 10:38:42.015137 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3076891009.mount: Deactivated successfully. May 15 10:38:42.665608 env[1202]: time="2025-05-15T10:38:42.665543630Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:42.667680 env[1202]: time="2025-05-15T10:38:42.667619369Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:42.669316 env[1202]: time="2025-05-15T10:38:42.669282114Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:42.670860 env[1202]: time="2025-05-15T10:38:42.670813865Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:42.671736 env[1202]: time="2025-05-15T10:38:42.671671070Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 10:38:42.675940 env[1202]: time="2025-05-15T10:38:42.675881349Z" level=info msg="CreateContainer within sandbox \"73f2dac95a61a61f6ece79abb20e4534b8ac96bf0092e6918c0f5beb9845f0b5\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:38:42.719350 env[1202]: time="2025-05-15T10:38:42.719274171Z" level=info msg="CreateContainer within sandbox \"73f2dac95a61a61f6ece79abb20e4534b8ac96bf0092e6918c0f5beb9845f0b5\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"d06f8ad35afd49ced33dd95320150045ceea9f9a9d2e5d42aae5aed5e43dbf86\"" May 15 10:38:42.719883 env[1202]: time="2025-05-15T10:38:42.719683127Z" level=info msg="StartContainer for \"d06f8ad35afd49ced33dd95320150045ceea9f9a9d2e5d42aae5aed5e43dbf86\"" May 15 10:38:42.740958 systemd[1]: Started cri-containerd-d06f8ad35afd49ced33dd95320150045ceea9f9a9d2e5d42aae5aed5e43dbf86.scope. May 15 10:38:42.759334 kernel: kauditd_printk_skb: 312 callbacks suppressed May 15 10:38:42.759461 kernel: audit: type=1400 audit(1747305522.754:901): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.759497 kernel: audit: type=1400 audit(1747305522.754:902): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.761892 kernel: audit: type=1400 audit(1747305522.754:903): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.764695 kernel: audit: type=1400 audit(1747305522.754:904): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.767583 kernel: audit: type=1400 audit(1747305522.754:905): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.770455 kernel: audit: type=1400 audit(1747305522.754:906): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.773462 kernel: audit: type=1400 audit(1747305522.754:907): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.776348 kernel: audit: type=1400 audit(1747305522.754:908): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.779226 kernel: audit: type=1400 audit(1747305522.754:909): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.754000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.782044 kernel: audit: type=1400 audit(1747305522.757:910): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.757000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.757000 audit: BPF prog-id=114 op=LOAD May 15 10:38:42.758000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2148 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366638616433356166643439636564333364643935333230313530 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2148 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366638616433356166643439636564333364643935333230313530 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.758000 audit: BPF prog-id=115 op=LOAD May 15 10:38:42.758000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098390 items=0 ppid=2148 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.758000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366638616433356166643439636564333364643935333230313530 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.763000 audit: BPF prog-id=116 op=LOAD May 15 10:38:42.763000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000983d8 items=0 ppid=2148 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366638616433356166643439636564333364643935333230313530 May 15 10:38:42.769000 audit: BPF prog-id=116 op=UNLOAD May 15 10:38:42.769000 audit: BPF prog-id=115 op=UNLOAD May 15 10:38:42.769000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { perfmon } for pid=2385 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit[2385]: AVC avc: denied { bpf } for pid=2385 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:42.769000 audit: BPF prog-id=117 op=LOAD May 15 10:38:42.769000 audit[2385]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000987e8 items=0 ppid=2148 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430366638616433356166643439636564333364643935333230313530 May 15 10:38:42.802289 env[1202]: time="2025-05-15T10:38:42.802216496Z" level=info msg="StartContainer for \"d06f8ad35afd49ced33dd95320150045ceea9f9a9d2e5d42aae5aed5e43dbf86\" returns successfully" May 15 10:38:43.040522 kubelet[2038]: I0515 10:38:43.040459 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-797db67f8-f5wt4" podStartSLOduration=1.739750438 podStartE2EDuration="4.040434825s" podCreationTimestamp="2025-05-15 10:38:39 +0000 UTC" firstStartedPulling="2025-05-15 10:38:40.372308119 +0000 UTC m=+15.485568762" lastFinishedPulling="2025-05-15 10:38:42.672992506 +0000 UTC m=+17.786253149" observedRunningTime="2025-05-15 10:38:43.040378019 +0000 UTC m=+18.153638672" watchObservedRunningTime="2025-05-15 10:38:43.040434825 +0000 UTC m=+18.153695468" May 15 10:38:43.686232 systemd[1]: run-containerd-runc-k8s.io-d06f8ad35afd49ced33dd95320150045ceea9f9a9d2e5d42aae5aed5e43dbf86-runc.snfatl.mount: Deactivated successfully. May 15 10:38:46.643000 audit[2422]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:46.643000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdc9534f80 a2=0 a3=7ffdc9534f6c items=0 ppid=2237 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:46.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:46.653000 audit[2422]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2422 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:46.653000 audit[2422]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdc9534f80 a2=0 a3=0 items=0 ppid=2237 pid=2422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:46.653000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:46.665000 audit[2424]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:46.665000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd51ab4e10 a2=0 a3=7ffd51ab4dfc items=0 ppid=2237 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:46.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:46.672000 audit[2424]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2424 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:46.672000 audit[2424]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd51ab4e10 a2=0 a3=0 items=0 ppid=2237 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:46.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:46.940949 kubelet[2038]: I0515 10:38:46.940819 2038 topology_manager.go:215] "Topology Admit Handler" podUID="287648d9-bfdb-4d85-89bf-ed5e66f874bc" podNamespace="calico-system" podName="calico-typha-6748c9c486-6f292" May 15 10:38:46.948046 systemd[1]: Created slice kubepods-besteffort-pod287648d9_bfdb_4d85_89bf_ed5e66f874bc.slice. May 15 10:38:47.004736 kubelet[2038]: I0515 10:38:47.004668 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h8ngn\" (UniqueName: \"kubernetes.io/projected/287648d9-bfdb-4d85-89bf-ed5e66f874bc-kube-api-access-h8ngn\") pod \"calico-typha-6748c9c486-6f292\" (UID: \"287648d9-bfdb-4d85-89bf-ed5e66f874bc\") " pod="calico-system/calico-typha-6748c9c486-6f292" May 15 10:38:47.004736 kubelet[2038]: I0515 10:38:47.004727 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/287648d9-bfdb-4d85-89bf-ed5e66f874bc-tigera-ca-bundle\") pod \"calico-typha-6748c9c486-6f292\" (UID: \"287648d9-bfdb-4d85-89bf-ed5e66f874bc\") " pod="calico-system/calico-typha-6748c9c486-6f292" May 15 10:38:47.004736 kubelet[2038]: I0515 10:38:47.004752 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/287648d9-bfdb-4d85-89bf-ed5e66f874bc-typha-certs\") pod \"calico-typha-6748c9c486-6f292\" (UID: \"287648d9-bfdb-4d85-89bf-ed5e66f874bc\") " pod="calico-system/calico-typha-6748c9c486-6f292" May 15 10:38:47.034029 kubelet[2038]: I0515 10:38:47.033985 2038 topology_manager.go:215] "Topology Admit Handler" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" podNamespace="calico-system" podName="calico-node-zmkdz" May 15 10:38:47.039821 systemd[1]: Created slice kubepods-besteffort-pod91c49c6b_c8f2_4e34_9258_1d7f99a2b855.slice. May 15 10:38:47.105122 kubelet[2038]: I0515 10:38:47.105038 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-xtables-lock\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.105389 kubelet[2038]: I0515 10:38:47.105372 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-var-lib-calico\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.105542 kubelet[2038]: I0515 10:38:47.105525 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-net-dir\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.105696 kubelet[2038]: I0515 10:38:47.105678 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-lib-modules\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.105825 kubelet[2038]: I0515 10:38:47.105809 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-policysync\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.105952 kubelet[2038]: I0515 10:38:47.105934 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-tigera-ca-bundle\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.106077 kubelet[2038]: I0515 10:38:47.106060 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-bin-dir\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.106287 kubelet[2038]: I0515 10:38:47.106267 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wtlzd\" (UniqueName: \"kubernetes.io/projected/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-kube-api-access-wtlzd\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.106409 kubelet[2038]: I0515 10:38:47.106390 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-var-run-calico\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.106551 kubelet[2038]: I0515 10:38:47.106533 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-flexvol-driver-host\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.106695 kubelet[2038]: I0515 10:38:47.106678 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-node-certs\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.106873 kubelet[2038]: I0515 10:38:47.106856 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-log-dir\") pod \"calico-node-zmkdz\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " pod="calico-system/calico-node-zmkdz" May 15 10:38:47.179564 kubelet[2038]: I0515 10:38:47.179498 2038 topology_manager.go:215] "Topology Admit Handler" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" podNamespace="calico-system" podName="csi-node-driver-pgdpk" May 15 10:38:47.179829 kubelet[2038]: E0515 10:38:47.179798 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:38:47.208981 kubelet[2038]: I0515 10:38:47.208936 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/eef1f6f4-36a9-4963-8ebe-9f756661b798-registration-dir\") pod \"csi-node-driver-pgdpk\" (UID: \"eef1f6f4-36a9-4963-8ebe-9f756661b798\") " pod="calico-system/csi-node-driver-pgdpk" May 15 10:38:47.209169 kubelet[2038]: I0515 10:38:47.209108 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/eef1f6f4-36a9-4963-8ebe-9f756661b798-socket-dir\") pod \"csi-node-driver-pgdpk\" (UID: \"eef1f6f4-36a9-4963-8ebe-9f756661b798\") " pod="calico-system/csi-node-driver-pgdpk" May 15 10:38:47.209225 kubelet[2038]: I0515 10:38:47.209168 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/eef1f6f4-36a9-4963-8ebe-9f756661b798-kubelet-dir\") pod \"csi-node-driver-pgdpk\" (UID: \"eef1f6f4-36a9-4963-8ebe-9f756661b798\") " pod="calico-system/csi-node-driver-pgdpk" May 15 10:38:47.209225 kubelet[2038]: I0515 10:38:47.209200 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/eef1f6f4-36a9-4963-8ebe-9f756661b798-varrun\") pod \"csi-node-driver-pgdpk\" (UID: \"eef1f6f4-36a9-4963-8ebe-9f756661b798\") " pod="calico-system/csi-node-driver-pgdpk" May 15 10:38:47.209290 kubelet[2038]: I0515 10:38:47.209236 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-98hll\" (UniqueName: \"kubernetes.io/projected/eef1f6f4-36a9-4963-8ebe-9f756661b798-kube-api-access-98hll\") pod \"csi-node-driver-pgdpk\" (UID: \"eef1f6f4-36a9-4963-8ebe-9f756661b798\") " pod="calico-system/csi-node-driver-pgdpk" May 15 10:38:47.214015 kubelet[2038]: E0515 10:38:47.213979 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.214015 kubelet[2038]: W0515 10:38:47.214004 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.214277 kubelet[2038]: E0515 10:38:47.214041 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.227288 kubelet[2038]: E0515 10:38:47.227244 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.227288 kubelet[2038]: W0515 10:38:47.227274 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.227288 kubelet[2038]: E0515 10:38:47.227298 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.252286 kubelet[2038]: E0515 10:38:47.252235 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:47.252859 env[1202]: time="2025-05-15T10:38:47.252815408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6748c9c486-6f292,Uid:287648d9-bfdb-4d85-89bf-ed5e66f874bc,Namespace:calico-system,Attempt:0,}" May 15 10:38:47.274314 env[1202]: time="2025-05-15T10:38:47.274195885Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:47.274314 env[1202]: time="2025-05-15T10:38:47.274267219Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:47.274314 env[1202]: time="2025-05-15T10:38:47.274288028Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:47.275295 env[1202]: time="2025-05-15T10:38:47.274714918Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e8bb57c8c9687428e4674d889af0b6b48d5a14048dad3a3b8c03dbb41f1372c pid=2440 runtime=io.containerd.runc.v2 May 15 10:38:47.287879 systemd[1]: Started cri-containerd-5e8bb57c8c9687428e4674d889af0b6b48d5a14048dad3a3b8c03dbb41f1372c.scope. May 15 10:38:47.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.301000 audit: BPF prog-id=118 op=LOAD May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2440 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565386262353763386339363837343238653436373464383839616630 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2440 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565386262353763386339363837343238653436373464383839616630 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit: BPF prog-id=119 op=LOAD May 15 10:38:47.302000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000280860 items=0 ppid=2440 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565386262353763386339363837343238653436373464383839616630 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit: BPF prog-id=120 op=LOAD May 15 10:38:47.302000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002808a8 items=0 ppid=2440 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565386262353763386339363837343238653436373464383839616630 May 15 10:38:47.302000 audit: BPF prog-id=120 op=UNLOAD May 15 10:38:47.302000 audit: BPF prog-id=119 op=UNLOAD May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { perfmon } for pid=2449 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit[2449]: AVC avc: denied { bpf } for pid=2449 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.302000 audit: BPF prog-id=121 op=LOAD May 15 10:38:47.302000 audit[2449]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000280cb8 items=0 ppid=2440 pid=2449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.302000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565386262353763386339363837343238653436373464383839616630 May 15 10:38:47.311154 kubelet[2038]: E0515 10:38:47.310164 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.311154 kubelet[2038]: W0515 10:38:47.310193 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.311154 kubelet[2038]: E0515 10:38:47.310216 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.311154 kubelet[2038]: E0515 10:38:47.310451 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.311154 kubelet[2038]: W0515 10:38:47.310459 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.311154 kubelet[2038]: E0515 10:38:47.310468 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.311404 kubelet[2038]: E0515 10:38:47.311265 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.311404 kubelet[2038]: W0515 10:38:47.311276 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.311404 kubelet[2038]: E0515 10:38:47.311290 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313124 kubelet[2038]: E0515 10:38:47.311538 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313124 kubelet[2038]: W0515 10:38:47.311554 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313124 kubelet[2038]: E0515 10:38:47.311564 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313124 kubelet[2038]: E0515 10:38:47.311787 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313124 kubelet[2038]: W0515 10:38:47.311795 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313124 kubelet[2038]: E0515 10:38:47.311872 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313124 kubelet[2038]: E0515 10:38:47.311954 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313124 kubelet[2038]: W0515 10:38:47.311977 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313124 kubelet[2038]: E0515 10:38:47.312050 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313124 kubelet[2038]: E0515 10:38:47.312152 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313393 kubelet[2038]: W0515 10:38:47.312159 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313393 kubelet[2038]: E0515 10:38:47.312223 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313393 kubelet[2038]: E0515 10:38:47.312322 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313393 kubelet[2038]: W0515 10:38:47.312327 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313393 kubelet[2038]: E0515 10:38:47.312336 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313393 kubelet[2038]: E0515 10:38:47.312476 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313393 kubelet[2038]: W0515 10:38:47.312482 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313393 kubelet[2038]: E0515 10:38:47.312491 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313393 kubelet[2038]: E0515 10:38:47.312637 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313393 kubelet[2038]: W0515 10:38:47.312652 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313613 kubelet[2038]: E0515 10:38:47.312665 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313613 kubelet[2038]: E0515 10:38:47.312854 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313613 kubelet[2038]: W0515 10:38:47.312862 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313613 kubelet[2038]: E0515 10:38:47.312871 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.313855 kubelet[2038]: E0515 10:38:47.313838 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.313855 kubelet[2038]: W0515 10:38:47.313850 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.313927 kubelet[2038]: E0515 10:38:47.313862 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.317587 kubelet[2038]: E0515 10:38:47.314270 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.317587 kubelet[2038]: W0515 10:38:47.314282 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.317587 kubelet[2038]: E0515 10:38:47.314341 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.318020 kubelet[2038]: E0515 10:38:47.317981 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.318020 kubelet[2038]: W0515 10:38:47.318005 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.318180 kubelet[2038]: E0515 10:38:47.318148 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.318858 kubelet[2038]: E0515 10:38:47.318830 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.318858 kubelet[2038]: W0515 10:38:47.318845 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.318961 kubelet[2038]: E0515 10:38:47.318929 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.319821 kubelet[2038]: E0515 10:38:47.319249 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.319821 kubelet[2038]: W0515 10:38:47.319279 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.319821 kubelet[2038]: E0515 10:38:47.319445 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.319821 kubelet[2038]: E0515 10:38:47.319556 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.319821 kubelet[2038]: W0515 10:38:47.319563 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.319821 kubelet[2038]: E0515 10:38:47.319635 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.319821 kubelet[2038]: E0515 10:38:47.319716 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.319821 kubelet[2038]: W0515 10:38:47.319723 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.319821 kubelet[2038]: E0515 10:38:47.319795 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.320757 kubelet[2038]: E0515 10:38:47.320579 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.320757 kubelet[2038]: W0515 10:38:47.320590 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.320757 kubelet[2038]: E0515 10:38:47.320604 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.322390 kubelet[2038]: E0515 10:38:47.322379 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.322474 kubelet[2038]: W0515 10:38:47.322458 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.322625 kubelet[2038]: E0515 10:38:47.322613 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.322764 kubelet[2038]: E0515 10:38:47.322752 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.322837 kubelet[2038]: W0515 10:38:47.322822 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.323004 kubelet[2038]: E0515 10:38:47.322992 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.323167 kubelet[2038]: E0515 10:38:47.323157 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.323290 kubelet[2038]: W0515 10:38:47.323273 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.323398 kubelet[2038]: E0515 10:38:47.323383 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.323909 kubelet[2038]: E0515 10:38:47.323892 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.323954 kubelet[2038]: W0515 10:38:47.323913 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.324080 kubelet[2038]: E0515 10:38:47.324062 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.324080 kubelet[2038]: W0515 10:38:47.324074 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.324175 kubelet[2038]: E0515 10:38:47.324082 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.324175 kubelet[2038]: E0515 10:38:47.324086 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.324637 kubelet[2038]: E0515 10:38:47.324616 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.324637 kubelet[2038]: W0515 10:38:47.324635 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.324705 kubelet[2038]: E0515 10:38:47.324648 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.331361 kubelet[2038]: E0515 10:38:47.331321 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:47.331528 kubelet[2038]: W0515 10:38:47.331350 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:47.331528 kubelet[2038]: E0515 10:38:47.331441 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:47.333754 env[1202]: time="2025-05-15T10:38:47.333704126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6748c9c486-6f292,Uid:287648d9-bfdb-4d85-89bf-ed5e66f874bc,Namespace:calico-system,Attempt:0,} returns sandbox id \"5e8bb57c8c9687428e4674d889af0b6b48d5a14048dad3a3b8c03dbb41f1372c\"" May 15 10:38:47.336161 kubelet[2038]: E0515 10:38:47.336041 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:47.336951 env[1202]: time="2025-05-15T10:38:47.336928690Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:38:47.343368 kubelet[2038]: E0515 10:38:47.343315 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:47.345596 env[1202]: time="2025-05-15T10:38:47.345521102Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zmkdz,Uid:91c49c6b-c8f2-4e34-9258-1d7f99a2b855,Namespace:calico-system,Attempt:0,}" May 15 10:38:47.371413 env[1202]: time="2025-05-15T10:38:47.371304310Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:38:47.371413 env[1202]: time="2025-05-15T10:38:47.371362830Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:38:47.371413 env[1202]: time="2025-05-15T10:38:47.371375203Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:38:47.371963 env[1202]: time="2025-05-15T10:38:47.371908182Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd pid=2506 runtime=io.containerd.runc.v2 May 15 10:38:47.388175 systemd[1]: Started cri-containerd-344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd.scope. May 15 10:38:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit: BPF prog-id=122 op=LOAD May 15 10:38:47.401000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2506 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343631356261613634653230643339616237303337613236636636 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2506 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343631356261613634653230643339616237303337613236636636 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.401000 audit: BPF prog-id=123 op=LOAD May 15 10:38:47.401000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024a40 items=0 ppid=2506 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343631356261613634653230643339616237303337613236636636 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit: BPF prog-id=124 op=LOAD May 15 10:38:47.402000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024a88 items=0 ppid=2506 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343631356261613634653230643339616237303337613236636636 May 15 10:38:47.402000 audit: BPF prog-id=124 op=UNLOAD May 15 10:38:47.402000 audit: BPF prog-id=123 op=UNLOAD May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:47.402000 audit: BPF prog-id=125 op=LOAD May 15 10:38:47.402000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024e98 items=0 ppid=2506 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334343631356261613634653230643339616237303337613236636636 May 15 10:38:47.416570 env[1202]: time="2025-05-15T10:38:47.416522732Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-zmkdz,Uid:91c49c6b-c8f2-4e34-9258-1d7f99a2b855,Namespace:calico-system,Attempt:0,} returns sandbox id \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\"" May 15 10:38:47.417552 kubelet[2038]: E0515 10:38:47.417524 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:47.686000 audit[2541]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:47.686000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7fff07b3cda0 a2=0 a3=7fff07b3cd8c items=0 ppid=2237 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.686000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:47.690000 audit[2541]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:38:47.690000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff07b3cda0 a2=0 a3=0 items=0 ppid=2237 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:47.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:38:48.971073 kubelet[2038]: E0515 10:38:48.971031 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:38:50.971678 kubelet[2038]: E0515 10:38:50.971293 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:38:51.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.44:22-10.0.0.1:46930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:51.626574 systemd[1]: Started sshd@7-10.0.0.44:22-10.0.0.1:46930.service. May 15 10:38:51.631472 kernel: kauditd_printk_skb: 179 callbacks suppressed May 15 10:38:51.631616 kernel: audit: type=1130 audit(1747305531.625:961): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.44:22-10.0.0.1:46930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:51.804000 audit[2544]: USER_ACCT pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.805038 sshd[2544]: Accepted publickey for core from 10.0.0.1 port 46930 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:51.807000 audit[2544]: CRED_ACQ pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.809215 sshd[2544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:51.816059 kernel: audit: type=1101 audit(1747305531.804:962): pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.816237 kernel: audit: type=1103 audit(1747305531.807:963): pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.816264 kernel: audit: type=1006 audit(1747305531.807:964): pid=2544 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 15 10:38:51.819800 kernel: audit: type=1300 audit(1747305531.807:964): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6ab413a0 a2=3 a3=0 items=0 ppid=1 pid=2544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.807000 audit[2544]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe6ab413a0 a2=3 a3=0 items=0 ppid=1 pid=2544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:51.827484 kernel: audit: type=1327 audit(1747305531.807:964): proctitle=737368643A20636F7265205B707269765D May 15 10:38:51.807000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:38:51.836395 systemd[1]: Started session-8.scope. May 15 10:38:51.841424 systemd-logind[1192]: New session 8 of user core. May 15 10:38:51.860000 audit[2544]: USER_START pid=2544 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.873430 kernel: audit: type=1105 audit(1747305531.860:965): pid=2544 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.874512 kernel: audit: type=1103 audit(1747305531.873:966): pid=2546 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:51.873000 audit[2546]: CRED_ACQ pid=2546 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:52.123942 sshd[2544]: pam_unix(sshd:session): session closed for user core May 15 10:38:52.127000 audit[2544]: USER_END pid=2544 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:52.130603 systemd[1]: sshd@7-10.0.0.44:22-10.0.0.1:46930.service: Deactivated successfully. May 15 10:38:52.131846 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:38:52.134747 systemd-logind[1192]: Session 8 logged out. Waiting for processes to exit. May 15 10:38:52.138374 systemd-logind[1192]: Removed session 8. May 15 10:38:52.127000 audit[2544]: CRED_DISP pid=2544 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:52.160021 kernel: audit: type=1106 audit(1747305532.127:967): pid=2544 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:52.160218 kernel: audit: type=1104 audit(1747305532.127:968): pid=2544 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:52.127000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.44:22-10.0.0.1:46930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:52.190075 env[1202]: time="2025-05-15T10:38:52.190018450Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.208817 env[1202]: time="2025-05-15T10:38:52.208769255Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.214113 env[1202]: time="2025-05-15T10:38:52.213981164Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.221130 env[1202]: time="2025-05-15T10:38:52.221062196Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.221757 env[1202]: time="2025-05-15T10:38:52.221685354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 10:38:52.224519 env[1202]: time="2025-05-15T10:38:52.224454124Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:38:52.244741 env[1202]: time="2025-05-15T10:38:52.244660097Z" level=info msg="CreateContainer within sandbox \"5e8bb57c8c9687428e4674d889af0b6b48d5a14048dad3a3b8c03dbb41f1372c\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:38:52.301828 env[1202]: time="2025-05-15T10:38:52.301740615Z" level=info msg="CreateContainer within sandbox \"5e8bb57c8c9687428e4674d889af0b6b48d5a14048dad3a3b8c03dbb41f1372c\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"8c84892f6ae1441763066ef376550a1602201d2d866faedacb292c9f74054935\"" May 15 10:38:52.307821 env[1202]: time="2025-05-15T10:38:52.305751122Z" level=info msg="StartContainer for \"8c84892f6ae1441763066ef376550a1602201d2d866faedacb292c9f74054935\"" May 15 10:38:52.349298 systemd[1]: Started cri-containerd-8c84892f6ae1441763066ef376550a1602201d2d866faedacb292c9f74054935.scope. May 15 10:38:52.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.376000 audit: BPF prog-id=126 op=LOAD May 15 10:38:52.378000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2440 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:52.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383438393266366165313434313736333036366566333736353530 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2440 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:52.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383438393266366165313434313736333036366566333736353530 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.378000 audit: BPF prog-id=127 op=LOAD May 15 10:38:52.378000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000301a00 items=0 ppid=2440 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:52.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383438393266366165313434313736333036366566333736353530 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.381000 audit: BPF prog-id=128 op=LOAD May 15 10:38:52.381000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000301a48 items=0 ppid=2440 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:52.381000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383438393266366165313434313736333036366566333736353530 May 15 10:38:52.385000 audit: BPF prog-id=128 op=UNLOAD May 15 10:38:52.385000 audit: BPF prog-id=127 op=UNLOAD May 15 10:38:52.385000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { perfmon } for pid=2566 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit[2566]: AVC avc: denied { bpf } for pid=2566 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:52.385000 audit: BPF prog-id=129 op=LOAD May 15 10:38:52.385000 audit[2566]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000301e58 items=0 ppid=2440 pid=2566 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:52.385000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863383438393266366165313434313736333036366566333736353530 May 15 10:38:52.468288 env[1202]: time="2025-05-15T10:38:52.468222748Z" level=info msg="StartContainer for \"8c84892f6ae1441763066ef376550a1602201d2d866faedacb292c9f74054935\" returns successfully" May 15 10:38:52.973771 kubelet[2038]: E0515 10:38:52.973694 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:38:53.052439 kubelet[2038]: E0515 10:38:53.050072 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:53.062858 kubelet[2038]: E0515 10:38:53.062646 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.062858 kubelet[2038]: W0515 10:38:53.062677 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.062858 kubelet[2038]: E0515 10:38:53.062699 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.063176 kubelet[2038]: E0515 10:38:53.062908 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.063176 kubelet[2038]: W0515 10:38:53.062916 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.063176 kubelet[2038]: E0515 10:38:53.062925 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.063176 kubelet[2038]: E0515 10:38:53.063046 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.063176 kubelet[2038]: W0515 10:38:53.063053 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.063176 kubelet[2038]: E0515 10:38:53.063061 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.063405 kubelet[2038]: E0515 10:38:53.063209 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.063405 kubelet[2038]: W0515 10:38:53.063218 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.063405 kubelet[2038]: E0515 10:38:53.063227 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.063405 kubelet[2038]: E0515 10:38:53.063388 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.063405 kubelet[2038]: W0515 10:38:53.063397 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.063405 kubelet[2038]: E0515 10:38:53.063405 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.063825 kubelet[2038]: E0515 10:38:53.063540 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.063825 kubelet[2038]: W0515 10:38:53.063549 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.063825 kubelet[2038]: E0515 10:38:53.063557 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.063825 kubelet[2038]: E0515 10:38:53.063718 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.063825 kubelet[2038]: W0515 10:38:53.063726 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.063825 kubelet[2038]: E0515 10:38:53.063736 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.064119 kubelet[2038]: E0515 10:38:53.063868 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.064119 kubelet[2038]: W0515 10:38:53.063876 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.064119 kubelet[2038]: E0515 10:38:53.063885 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.064119 kubelet[2038]: E0515 10:38:53.064046 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.064119 kubelet[2038]: W0515 10:38:53.064055 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.064119 kubelet[2038]: E0515 10:38:53.064064 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.064327 kubelet[2038]: E0515 10:38:53.064205 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.064327 kubelet[2038]: W0515 10:38:53.064214 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.064327 kubelet[2038]: E0515 10:38:53.064222 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.064455 kubelet[2038]: E0515 10:38:53.064347 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.064455 kubelet[2038]: W0515 10:38:53.064355 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.064455 kubelet[2038]: E0515 10:38:53.064364 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.064562 kubelet[2038]: E0515 10:38:53.064505 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.064562 kubelet[2038]: W0515 10:38:53.064513 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.064562 kubelet[2038]: E0515 10:38:53.064523 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.064673 kubelet[2038]: E0515 10:38:53.064660 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.064673 kubelet[2038]: W0515 10:38:53.064669 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.064749 kubelet[2038]: E0515 10:38:53.064677 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.065276 kubelet[2038]: E0515 10:38:53.064808 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.065276 kubelet[2038]: W0515 10:38:53.064830 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.065276 kubelet[2038]: E0515 10:38:53.064838 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.065276 kubelet[2038]: E0515 10:38:53.064980 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.065276 kubelet[2038]: W0515 10:38:53.064989 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.065276 kubelet[2038]: E0515 10:38:53.065004 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089024 kubelet[2038]: E0515 10:38:53.070921 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089024 kubelet[2038]: W0515 10:38:53.071008 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089024 kubelet[2038]: E0515 10:38:53.071047 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089024 kubelet[2038]: E0515 10:38:53.071476 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089024 kubelet[2038]: W0515 10:38:53.071496 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089024 kubelet[2038]: E0515 10:38:53.071508 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089024 kubelet[2038]: E0515 10:38:53.071682 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089024 kubelet[2038]: W0515 10:38:53.071691 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089024 kubelet[2038]: E0515 10:38:53.071700 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089024 kubelet[2038]: E0515 10:38:53.071884 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089563 kubelet[2038]: W0515 10:38:53.071892 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089563 kubelet[2038]: E0515 10:38:53.071902 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089563 kubelet[2038]: E0515 10:38:53.072048 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089563 kubelet[2038]: W0515 10:38:53.072056 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089563 kubelet[2038]: E0515 10:38:53.072065 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089563 kubelet[2038]: E0515 10:38:53.072203 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089563 kubelet[2038]: W0515 10:38:53.072210 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089563 kubelet[2038]: E0515 10:38:53.072230 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089563 kubelet[2038]: E0515 10:38:53.073384 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089563 kubelet[2038]: W0515 10:38:53.073399 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089873 kubelet[2038]: E0515 10:38:53.073568 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089873 kubelet[2038]: E0515 10:38:53.075717 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089873 kubelet[2038]: W0515 10:38:53.075730 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089873 kubelet[2038]: E0515 10:38:53.075889 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089873 kubelet[2038]: W0515 10:38:53.075898 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089873 kubelet[2038]: E0515 10:38:53.076068 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089873 kubelet[2038]: W0515 10:38:53.076079 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.089873 kubelet[2038]: E0515 10:38:53.076110 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.089873 kubelet[2038]: E0515 10:38:53.076276 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.089873 kubelet[2038]: W0515 10:38:53.076286 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.090190 kubelet[2038]: E0515 10:38:53.076296 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090190 kubelet[2038]: E0515 10:38:53.077612 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.090190 kubelet[2038]: W0515 10:38:53.077625 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.090190 kubelet[2038]: E0515 10:38:53.077638 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090190 kubelet[2038]: E0515 10:38:53.077805 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.090190 kubelet[2038]: W0515 10:38:53.077814 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.090190 kubelet[2038]: E0515 10:38:53.077823 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090190 kubelet[2038]: E0515 10:38:53.078278 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.090190 kubelet[2038]: W0515 10:38:53.078288 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.090190 kubelet[2038]: E0515 10:38:53.078297 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090500 kubelet[2038]: E0515 10:38:53.078326 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090500 kubelet[2038]: E0515 10:38:53.078341 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090500 kubelet[2038]: E0515 10:38:53.078494 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.090500 kubelet[2038]: W0515 10:38:53.078502 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.090500 kubelet[2038]: E0515 10:38:53.078510 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090500 kubelet[2038]: E0515 10:38:53.078630 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.090500 kubelet[2038]: W0515 10:38:53.078637 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.090500 kubelet[2038]: E0515 10:38:53.078645 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090500 kubelet[2038]: E0515 10:38:53.078787 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.090500 kubelet[2038]: W0515 10:38:53.078796 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.090808 kubelet[2038]: E0515 10:38:53.078805 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:53.090808 kubelet[2038]: E0515 10:38:53.079045 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:53.090808 kubelet[2038]: W0515 10:38:53.079052 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:53.090808 kubelet[2038]: E0515 10:38:53.079060 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.053206 kubelet[2038]: I0515 10:38:54.053159 2038 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:38:54.055931 kubelet[2038]: E0515 10:38:54.054796 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:54.082152 kubelet[2038]: E0515 10:38:54.082079 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.082152 kubelet[2038]: W0515 10:38:54.082140 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.082472 kubelet[2038]: E0515 10:38:54.082168 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.082472 kubelet[2038]: E0515 10:38:54.082376 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.082472 kubelet[2038]: W0515 10:38:54.082384 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.082472 kubelet[2038]: E0515 10:38:54.082393 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.082710 kubelet[2038]: E0515 10:38:54.082687 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.082710 kubelet[2038]: W0515 10:38:54.082701 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.082792 kubelet[2038]: E0515 10:38:54.082711 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.082909 kubelet[2038]: E0515 10:38:54.082893 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.082909 kubelet[2038]: W0515 10:38:54.082904 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.083014 kubelet[2038]: E0515 10:38:54.082914 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.083142 kubelet[2038]: E0515 10:38:54.083116 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.083142 kubelet[2038]: W0515 10:38:54.083133 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.083142 kubelet[2038]: E0515 10:38:54.083143 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.083394 kubelet[2038]: E0515 10:38:54.083342 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.083394 kubelet[2038]: W0515 10:38:54.083365 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.083394 kubelet[2038]: E0515 10:38:54.083376 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.083717 kubelet[2038]: E0515 10:38:54.083693 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.083717 kubelet[2038]: W0515 10:38:54.083705 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.083810 kubelet[2038]: E0515 10:38:54.083715 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.083938 kubelet[2038]: E0515 10:38:54.083920 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.083994 kubelet[2038]: W0515 10:38:54.083935 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.083994 kubelet[2038]: E0515 10:38:54.083968 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.084690 kubelet[2038]: E0515 10:38:54.084675 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.084690 kubelet[2038]: W0515 10:38:54.084688 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.084808 kubelet[2038]: E0515 10:38:54.084700 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.084888 kubelet[2038]: E0515 10:38:54.084872 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.084888 kubelet[2038]: W0515 10:38:54.084884 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.084981 kubelet[2038]: E0515 10:38:54.084894 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.085168 kubelet[2038]: E0515 10:38:54.085082 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.085168 kubelet[2038]: W0515 10:38:54.085124 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.085168 kubelet[2038]: E0515 10:38:54.085136 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.085645 kubelet[2038]: E0515 10:38:54.085334 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.085645 kubelet[2038]: W0515 10:38:54.085344 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.085645 kubelet[2038]: E0515 10:38:54.085363 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.085645 kubelet[2038]: E0515 10:38:54.085580 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.085645 kubelet[2038]: W0515 10:38:54.085590 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.085645 kubelet[2038]: E0515 10:38:54.085601 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.085845 kubelet[2038]: E0515 10:38:54.085836 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.085879 kubelet[2038]: W0515 10:38:54.085847 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.085879 kubelet[2038]: E0515 10:38:54.085859 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.086143 kubelet[2038]: E0515 10:38:54.086059 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.086143 kubelet[2038]: W0515 10:38:54.086073 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.086143 kubelet[2038]: E0515 10:38:54.086084 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.093025 kubelet[2038]: E0515 10:38:54.092993 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.093300 kubelet[2038]: W0515 10:38:54.093278 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.093419 kubelet[2038]: E0515 10:38:54.093401 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.093984 kubelet[2038]: E0515 10:38:54.093971 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.094071 kubelet[2038]: W0515 10:38:54.094053 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.094327 kubelet[2038]: E0515 10:38:54.094307 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.096378 kubelet[2038]: E0515 10:38:54.095204 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.096487 kubelet[2038]: W0515 10:38:54.096468 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.096595 kubelet[2038]: E0515 10:38:54.096575 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.096870 kubelet[2038]: E0515 10:38:54.096858 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.096978 kubelet[2038]: W0515 10:38:54.096959 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.097069 kubelet[2038]: E0515 10:38:54.097049 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.097314 kubelet[2038]: E0515 10:38:54.097302 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.101271 kubelet[2038]: W0515 10:38:54.097755 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.101271 kubelet[2038]: E0515 10:38:54.099858 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.103508 kubelet[2038]: E0515 10:38:54.101717 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.103508 kubelet[2038]: W0515 10:38:54.101730 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.103508 kubelet[2038]: E0515 10:38:54.101813 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.103508 kubelet[2038]: E0515 10:38:54.101963 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.103508 kubelet[2038]: W0515 10:38:54.101971 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.103508 kubelet[2038]: E0515 10:38:54.102121 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.103508 kubelet[2038]: W0515 10:38:54.102130 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.103508 kubelet[2038]: E0515 10:38:54.102140 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.103508 kubelet[2038]: E0515 10:38:54.102448 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.103508 kubelet[2038]: W0515 10:38:54.102457 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.103857 kubelet[2038]: E0515 10:38:54.102466 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.103857 kubelet[2038]: E0515 10:38:54.102602 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.103857 kubelet[2038]: W0515 10:38:54.102613 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.103857 kubelet[2038]: E0515 10:38:54.102621 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.103857 kubelet[2038]: E0515 10:38:54.102747 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.103857 kubelet[2038]: W0515 10:38:54.102755 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.103857 kubelet[2038]: E0515 10:38:54.102764 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.103857 kubelet[2038]: E0515 10:38:54.102896 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.103857 kubelet[2038]: W0515 10:38:54.102905 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.103857 kubelet[2038]: E0515 10:38:54.102914 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.104173 kubelet[2038]: E0515 10:38:54.103057 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.104173 kubelet[2038]: W0515 10:38:54.103066 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.104173 kubelet[2038]: E0515 10:38:54.103074 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.104173 kubelet[2038]: E0515 10:38:54.103418 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.104173 kubelet[2038]: W0515 10:38:54.103428 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.104173 kubelet[2038]: E0515 10:38:54.103437 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.104173 kubelet[2038]: E0515 10:38:54.103447 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.104173 kubelet[2038]: E0515 10:38:54.103656 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.104173 kubelet[2038]: W0515 10:38:54.103666 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.104173 kubelet[2038]: E0515 10:38:54.103677 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.104494 kubelet[2038]: E0515 10:38:54.103805 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.104494 kubelet[2038]: W0515 10:38:54.103813 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.104494 kubelet[2038]: E0515 10:38:54.103822 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.104494 kubelet[2038]: E0515 10:38:54.103976 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.104494 kubelet[2038]: W0515 10:38:54.103985 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.104494 kubelet[2038]: E0515 10:38:54.103995 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.104494 kubelet[2038]: E0515 10:38:54.104389 2038 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:38:54.104494 kubelet[2038]: W0515 10:38:54.104398 2038 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:38:54.104494 kubelet[2038]: E0515 10:38:54.104408 2038 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:38:54.339364 env[1202]: time="2025-05-15T10:38:54.339194641Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:54.344723 env[1202]: time="2025-05-15T10:38:54.344195164Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:54.347246 env[1202]: time="2025-05-15T10:38:54.347193214Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:54.351743 env[1202]: time="2025-05-15T10:38:54.350555957Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:54.351743 env[1202]: time="2025-05-15T10:38:54.350996463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 10:38:54.354450 env[1202]: time="2025-05-15T10:38:54.354404511Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:38:54.386042 env[1202]: time="2025-05-15T10:38:54.385956814Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc\"" May 15 10:38:54.390830 env[1202]: time="2025-05-15T10:38:54.390742354Z" level=info msg="StartContainer for \"3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc\"" May 15 10:38:54.437056 systemd[1]: run-containerd-runc-k8s.io-3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc-runc.NmREIq.mount: Deactivated successfully. May 15 10:38:54.438848 systemd[1]: Started cri-containerd-3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc.scope. May 15 10:38:54.471000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f2f607694d8 items=0 ppid=2506 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:54.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373364643061663335333936646665666162653331383161333566 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.471000 audit: BPF prog-id=130 op=LOAD May 15 10:38:54.471000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000219618 items=0 ppid=2506 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:54.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373364643061663335333936646665666162653331383161333566 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit: BPF prog-id=131 op=LOAD May 15 10:38:54.472000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000219668 items=0 ppid=2506 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:54.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373364643061663335333936646665666162653331383161333566 May 15 10:38:54.472000 audit: BPF prog-id=131 op=UNLOAD May 15 10:38:54.472000 audit: BPF prog-id=130 op=UNLOAD May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { perfmon } for pid=2670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit[2670]: AVC avc: denied { bpf } for pid=2670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:54.472000 audit: BPF prog-id=132 op=LOAD May 15 10:38:54.472000 audit[2670]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c0002196f8 items=0 ppid=2506 pid=2670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:54.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335373364643061663335333936646665666162653331383161333566 May 15 10:38:54.502334 env[1202]: time="2025-05-15T10:38:54.502236912Z" level=info msg="StartContainer for \"3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc\" returns successfully" May 15 10:38:54.510297 systemd[1]: cri-containerd-3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc.scope: Deactivated successfully. May 15 10:38:54.515000 audit: BPF prog-id=132 op=UNLOAD May 15 10:38:54.635191 env[1202]: time="2025-05-15T10:38:54.633928398Z" level=info msg="shim disconnected" id=3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc May 15 10:38:54.635191 env[1202]: time="2025-05-15T10:38:54.633988130Z" level=warning msg="cleaning up after shim disconnected" id=3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc namespace=k8s.io May 15 10:38:54.635191 env[1202]: time="2025-05-15T10:38:54.633998119Z" level=info msg="cleaning up dead shim" May 15 10:38:54.653232 env[1202]: time="2025-05-15T10:38:54.652586572Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:38:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2709 runtime=io.containerd.runc.v2\n" May 15 10:38:54.973387 kubelet[2038]: E0515 10:38:54.971939 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:38:55.074522 kubelet[2038]: E0515 10:38:55.072265 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:38:55.078830 env[1202]: time="2025-05-15T10:38:55.078778811Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:38:55.311414 kubelet[2038]: I0515 10:38:55.310221 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-6748c9c486-6f292" podStartSLOduration=4.423455351 podStartE2EDuration="9.310196095s" podCreationTimestamp="2025-05-15 10:38:46 +0000 UTC" firstStartedPulling="2025-05-15 10:38:47.336697396 +0000 UTC m=+22.449958039" lastFinishedPulling="2025-05-15 10:38:52.22343814 +0000 UTC m=+27.336698783" observedRunningTime="2025-05-15 10:38:53.122365786 +0000 UTC m=+28.235626429" watchObservedRunningTime="2025-05-15 10:38:55.310196095 +0000 UTC m=+30.423456738" May 15 10:38:55.377685 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc-rootfs.mount: Deactivated successfully. May 15 10:38:56.974969 kubelet[2038]: E0515 10:38:56.973353 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:38:57.127028 systemd[1]: Started sshd@8-10.0.0.44:22-10.0.0.1:46940.service. May 15 10:38:57.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.44:22-10.0.0.1:46940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.149349 kernel: kauditd_printk_skb: 102 callbacks suppressed May 15 10:38:57.149520 kernel: audit: type=1130 audit(1747305537.126:995): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.44:22-10.0.0.1:46940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:57.263000 audit[2727]: USER_ACCT pid=2727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.267195 sshd[2727]: Accepted publickey for core from 10.0.0.1 port 46940 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:38:57.280860 kernel: audit: type=1101 audit(1747305537.263:996): pid=2727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.281012 kernel: audit: type=1103 audit(1747305537.277:997): pid=2727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.277000 audit[2727]: CRED_ACQ pid=2727 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.282472 sshd[2727]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:57.292686 kernel: audit: type=1006 audit(1747305537.280:998): pid=2727 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 15 10:38:57.280000 audit[2727]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd601d92b0 a2=3 a3=0 items=0 ppid=1 pid=2727 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:57.298544 systemd[1]: Started session-9.scope. May 15 10:38:57.298920 systemd-logind[1192]: New session 9 of user core. May 15 10:38:57.299754 kernel: audit: type=1300 audit(1747305537.280:998): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd601d92b0 a2=3 a3=0 items=0 ppid=1 pid=2727 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:57.280000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:38:57.304135 kernel: audit: type=1327 audit(1747305537.280:998): proctitle=737368643A20636F7265205B707269765D May 15 10:38:57.308000 audit[2727]: USER_START pid=2727 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.310000 audit[2729]: CRED_ACQ pid=2729 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.326994 kernel: audit: type=1105 audit(1747305537.308:999): pid=2727 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.327117 kernel: audit: type=1103 audit(1747305537.310:1000): pid=2729 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.552413 sshd[2727]: pam_unix(sshd:session): session closed for user core May 15 10:38:57.556000 audit[2727]: USER_END pid=2727 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.560873 systemd-logind[1192]: Session 9 logged out. Waiting for processes to exit. May 15 10:38:57.562755 systemd[1]: sshd@8-10.0.0.44:22-10.0.0.1:46940.service: Deactivated successfully. May 15 10:38:57.567105 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:38:57.569793 systemd-logind[1192]: Removed session 9. May 15 10:38:57.584170 kernel: audit: type=1106 audit(1747305537.556:1001): pid=2727 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.584359 kernel: audit: type=1104 audit(1747305537.556:1002): pid=2727 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.556000 audit[2727]: CRED_DISP pid=2727 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:57.561000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.44:22-10.0.0.1:46940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.971642 kubelet[2038]: E0515 10:38:58.971556 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:39:00.981231 kubelet[2038]: E0515 10:39:00.979524 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:39:02.358068 env[1202]: time="2025-05-15T10:39:02.357976301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.364861 env[1202]: time="2025-05-15T10:39:02.364677383Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.369768 env[1202]: time="2025-05-15T10:39:02.368737415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.371110 env[1202]: time="2025-05-15T10:39:02.371046954Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.371654 env[1202]: time="2025-05-15T10:39:02.371623024Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 10:39:02.374927 env[1202]: time="2025-05-15T10:39:02.374889788Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:39:02.394362 env[1202]: time="2025-05-15T10:39:02.394299355Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002\"" May 15 10:39:02.394976 env[1202]: time="2025-05-15T10:39:02.394942431Z" level=info msg="StartContainer for \"f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002\"" May 15 10:39:02.418796 systemd[1]: Started cri-containerd-f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002.scope. May 15 10:39:02.442644 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:39:02.442812 kernel: audit: type=1400 audit(1747305542.438:1004): avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd18e969250 items=0 ppid=2506 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.453597 kernel: audit: type=1300 audit(1747305542.438:1004): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fd18e969250 items=0 ppid=2506 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.453763 kernel: audit: type=1327 audit(1747305542.438:1004): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363632366662346539343363613165613862616362303936653361 May 15 10:39:02.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363632366662346539343363613165613862616362303936653361 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.462329 kernel: audit: type=1400 audit(1747305542.438:1005): avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.462410 kernel: audit: type=1400 audit(1747305542.438:1005): avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.469947 kernel: audit: type=1400 audit(1747305542.438:1005): avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.474141 kernel: audit: type=1400 audit(1747305542.438:1005): avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.479179 kernel: audit: type=1400 audit(1747305542.438:1005): avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.479334 kernel: audit: type=1400 audit(1747305542.438:1005): avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.485406 kernel: audit: type=1400 audit(1747305542.438:1005): avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.438000 audit: BPF prog-id=133 op=LOAD May 15 10:39:02.438000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000342aa8 items=0 ppid=2506 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363632366662346539343363613165613862616362303936653361 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.443000 audit: BPF prog-id=134 op=LOAD May 15 10:39:02.443000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000342af8 items=0 ppid=2506 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363632366662346539343363613165613862616362303936653361 May 15 10:39:02.453000 audit: BPF prog-id=134 op=UNLOAD May 15 10:39:02.453000 audit: BPF prog-id=133 op=UNLOAD May 15 10:39:02.453000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { perfmon } for pid=2755 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit[2755]: AVC avc: denied { bpf } for pid=2755 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.453000 audit: BPF prog-id=135 op=LOAD May 15 10:39:02.453000 audit[2755]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000342b88 items=0 ppid=2506 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632363632366662346539343363613165613862616362303936653361 May 15 10:39:02.557474 systemd[1]: Started sshd@9-10.0.0.44:22-10.0.0.1:46338.service. May 15 10:39:02.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.44:22-10.0.0.1:46338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:02.633961 env[1202]: time="2025-05-15T10:39:02.633827137Z" level=info msg="StartContainer for \"f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002\" returns successfully" May 15 10:39:02.663906 sshd[2782]: Accepted publickey for core from 10.0.0.1 port 46338 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:02.662000 audit[2782]: USER_ACCT pid=2782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:02.665000 audit[2782]: CRED_ACQ pid=2782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:02.665000 audit[2782]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4fff74b0 a2=3 a3=0 items=0 ppid=1 pid=2782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.665000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:02.666885 sshd[2782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:02.671425 systemd[1]: Started session-10.scope. May 15 10:39:02.671715 systemd-logind[1192]: New session 10 of user core. May 15 10:39:02.675000 audit[2782]: USER_START pid=2782 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:02.676000 audit[2784]: CRED_ACQ pid=2784 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:02.793791 sshd[2782]: pam_unix(sshd:session): session closed for user core May 15 10:39:02.795000 audit[2782]: USER_END pid=2782 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:02.795000 audit[2782]: CRED_DISP pid=2782 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:02.798235 systemd[1]: sshd@9-10.0.0.44:22-10.0.0.1:46338.service: Deactivated successfully. May 15 10:39:02.799054 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:39:02.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.44:22-10.0.0.1:46338 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:02.800459 systemd-logind[1192]: Session 10 logged out. Waiting for processes to exit. May 15 10:39:02.801862 systemd-logind[1192]: Removed session 10. May 15 10:39:02.975257 kubelet[2038]: E0515 10:39:02.975180 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:39:03.126185 kubelet[2038]: E0515 10:39:03.122364 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:03.387881 systemd[1]: run-containerd-runc-k8s.io-f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002-runc.u9kpPL.mount: Deactivated successfully. May 15 10:39:03.985704 env[1202]: time="2025-05-15T10:39:03.985604662Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:39:03.989498 systemd[1]: cri-containerd-f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002.scope: Deactivated successfully. May 15 10:39:03.993000 audit: BPF prog-id=135 op=UNLOAD May 15 10:39:04.014304 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002-rootfs.mount: Deactivated successfully. May 15 10:39:04.028127 env[1202]: time="2025-05-15T10:39:04.028011202Z" level=info msg="shim disconnected" id=f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002 May 15 10:39:04.028127 env[1202]: time="2025-05-15T10:39:04.028085572Z" level=warning msg="cleaning up after shim disconnected" id=f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002 namespace=k8s.io May 15 10:39:04.028127 env[1202]: time="2025-05-15T10:39:04.028133602Z" level=info msg="cleaning up dead shim" May 15 10:39:04.032147 kubelet[2038]: I0515 10:39:04.032080 2038 kubelet_node_status.go:497] "Fast updating node status as it just became ready" May 15 10:39:04.045987 env[1202]: time="2025-05-15T10:39:04.045912122Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2808 runtime=io.containerd.runc.v2\n" May 15 10:39:04.066795 kubelet[2038]: I0515 10:39:04.066712 2038 topology_manager.go:215] "Topology Admit Handler" podUID="af843951-e0be-4fdf-bf7c-7b61c7a66c0c" podNamespace="calico-apiserver" podName="calico-apiserver-57f7ddb74b-fxxpk" May 15 10:39:04.072656 kubelet[2038]: I0515 10:39:04.071247 2038 topology_manager.go:215] "Topology Admit Handler" podUID="d599ad29-ab1c-4f94-a799-31f081a7cdec" podNamespace="kube-system" podName="coredns-7db6d8ff4d-km746" May 15 10:39:04.077136 kubelet[2038]: I0515 10:39:04.075847 2038 topology_manager.go:215] "Topology Admit Handler" podUID="38e13e26-0f53-4fa0-b34d-bef637b8c73d" podNamespace="calico-apiserver" podName="calico-apiserver-57f7ddb74b-w96td" May 15 10:39:04.077136 kubelet[2038]: I0515 10:39:04.076641 2038 topology_manager.go:215] "Topology Admit Handler" podUID="977383d6-9b09-4182-9d9f-aa8e054ab44e" podNamespace="kube-system" podName="coredns-7db6d8ff4d-d5ptl" May 15 10:39:04.077466 kubelet[2038]: I0515 10:39:04.077428 2038 topology_manager.go:215] "Topology Admit Handler" podUID="a549a8f9-4c84-43d4-aeaf-975efd7251f9" podNamespace="calico-system" podName="calico-kube-controllers-5b9c694b5b-s5dhd" May 15 10:39:04.079754 systemd[1]: Created slice kubepods-besteffort-podaf843951_e0be_4fdf_bf7c_7b61c7a66c0c.slice. May 15 10:39:04.088933 systemd[1]: Created slice kubepods-burstable-podd599ad29_ab1c_4f94_a799_31f081a7cdec.slice. May 15 10:39:04.097607 systemd[1]: Created slice kubepods-besteffort-pod38e13e26_0f53_4fa0_b34d_bef637b8c73d.slice. May 15 10:39:04.106198 systemd[1]: Created slice kubepods-burstable-pod977383d6_9b09_4182_9d9f_aa8e054ab44e.slice. May 15 10:39:04.112510 systemd[1]: Created slice kubepods-besteffort-poda549a8f9_4c84_43d4_aeaf_975efd7251f9.slice. May 15 10:39:04.130614 kubelet[2038]: E0515 10:39:04.130357 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:04.131900 env[1202]: time="2025-05-15T10:39:04.131830077Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:39:04.148391 kubelet[2038]: I0515 10:39:04.148320 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/af843951-e0be-4fdf-bf7c-7b61c7a66c0c-calico-apiserver-certs\") pod \"calico-apiserver-57f7ddb74b-fxxpk\" (UID: \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\") " pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" May 15 10:39:04.148593 kubelet[2038]: I0515 10:39:04.148401 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/a549a8f9-4c84-43d4-aeaf-975efd7251f9-tigera-ca-bundle\") pod \"calico-kube-controllers-5b9c694b5b-s5dhd\" (UID: \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\") " pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" May 15 10:39:04.148593 kubelet[2038]: I0515 10:39:04.148442 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-htc8x\" (UniqueName: \"kubernetes.io/projected/af843951-e0be-4fdf-bf7c-7b61c7a66c0c-kube-api-access-htc8x\") pod \"calico-apiserver-57f7ddb74b-fxxpk\" (UID: \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\") " pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" May 15 10:39:04.148593 kubelet[2038]: I0515 10:39:04.148461 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-f7z8f\" (UniqueName: \"kubernetes.io/projected/a549a8f9-4c84-43d4-aeaf-975efd7251f9-kube-api-access-f7z8f\") pod \"calico-kube-controllers-5b9c694b5b-s5dhd\" (UID: \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\") " pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" May 15 10:39:04.148593 kubelet[2038]: I0515 10:39:04.148483 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/38e13e26-0f53-4fa0-b34d-bef637b8c73d-calico-apiserver-certs\") pod \"calico-apiserver-57f7ddb74b-w96td\" (UID: \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\") " pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" May 15 10:39:04.148593 kubelet[2038]: I0515 10:39:04.148502 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9v5cn\" (UniqueName: \"kubernetes.io/projected/38e13e26-0f53-4fa0-b34d-bef637b8c73d-kube-api-access-9v5cn\") pod \"calico-apiserver-57f7ddb74b-w96td\" (UID: \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\") " pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" May 15 10:39:04.148800 kubelet[2038]: I0515 10:39:04.148521 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d599ad29-ab1c-4f94-a799-31f081a7cdec-config-volume\") pod \"coredns-7db6d8ff4d-km746\" (UID: \"d599ad29-ab1c-4f94-a799-31f081a7cdec\") " pod="kube-system/coredns-7db6d8ff4d-km746" May 15 10:39:04.148800 kubelet[2038]: I0515 10:39:04.148540 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rm98x\" (UniqueName: \"kubernetes.io/projected/977383d6-9b09-4182-9d9f-aa8e054ab44e-kube-api-access-rm98x\") pod \"coredns-7db6d8ff4d-d5ptl\" (UID: \"977383d6-9b09-4182-9d9f-aa8e054ab44e\") " pod="kube-system/coredns-7db6d8ff4d-d5ptl" May 15 10:39:04.148800 kubelet[2038]: I0515 10:39:04.148558 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/977383d6-9b09-4182-9d9f-aa8e054ab44e-config-volume\") pod \"coredns-7db6d8ff4d-d5ptl\" (UID: \"977383d6-9b09-4182-9d9f-aa8e054ab44e\") " pod="kube-system/coredns-7db6d8ff4d-d5ptl" May 15 10:39:04.148800 kubelet[2038]: I0515 10:39:04.148574 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-pfph7\" (UniqueName: \"kubernetes.io/projected/d599ad29-ab1c-4f94-a799-31f081a7cdec-kube-api-access-pfph7\") pod \"coredns-7db6d8ff4d-km746\" (UID: \"d599ad29-ab1c-4f94-a799-31f081a7cdec\") " pod="kube-system/coredns-7db6d8ff4d-km746" May 15 10:39:04.394191 kubelet[2038]: E0515 10:39:04.394052 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:04.395189 env[1202]: time="2025-05-15T10:39:04.395145997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-km746,Uid:d599ad29-ab1c-4f94-a799-31f081a7cdec,Namespace:kube-system,Attempt:0,}" May 15 10:39:04.402995 env[1202]: time="2025-05-15T10:39:04.402943184Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f7ddb74b-w96td,Uid:38e13e26-0f53-4fa0-b34d-bef637b8c73d,Namespace:calico-apiserver,Attempt:0,}" May 15 10:39:04.409664 kubelet[2038]: E0515 10:39:04.409606 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:04.411208 env[1202]: time="2025-05-15T10:39:04.410418519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-d5ptl,Uid:977383d6-9b09-4182-9d9f-aa8e054ab44e,Namespace:kube-system,Attempt:0,}" May 15 10:39:04.419499 env[1202]: time="2025-05-15T10:39:04.419449018Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b9c694b5b-s5dhd,Uid:a549a8f9-4c84-43d4-aeaf-975efd7251f9,Namespace:calico-system,Attempt:0,}" May 15 10:39:04.683621 env[1202]: time="2025-05-15T10:39:04.683469168Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f7ddb74b-fxxpk,Uid:af843951-e0be-4fdf-bf7c-7b61c7a66c0c,Namespace:calico-apiserver,Attempt:0,}" May 15 10:39:04.977506 systemd[1]: Created slice kubepods-besteffort-podeef1f6f4_36a9_4963_8ebe_9f756661b798.slice. May 15 10:39:04.979859 env[1202]: time="2025-05-15T10:39:04.979806976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pgdpk,Uid:eef1f6f4-36a9-4963-8ebe-9f756661b798,Namespace:calico-system,Attempt:0,}" May 15 10:39:05.900884 env[1202]: time="2025-05-15T10:39:05.900814239Z" level=error msg="Failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.901594 env[1202]: time="2025-05-15T10:39:05.901569104Z" level=error msg="encountered an error cleaning up failed sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.901708 env[1202]: time="2025-05-15T10:39:05.901678810Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b9c694b5b-s5dhd,Uid:a549a8f9-4c84-43d4-aeaf-975efd7251f9,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.902111 kubelet[2038]: E0515 10:39:05.902034 2038 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.902308 kubelet[2038]: E0515 10:39:05.902149 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" May 15 10:39:05.902308 kubelet[2038]: E0515 10:39:05.902170 2038 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" May 15 10:39:05.902308 kubelet[2038]: E0515 10:39:05.902220 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5b9c694b5b-s5dhd_calico-system(a549a8f9-4c84-43d4-aeaf-975efd7251f9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5b9c694b5b-s5dhd_calico-system(a549a8f9-4c84-43d4-aeaf-975efd7251f9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" podUID="a549a8f9-4c84-43d4-aeaf-975efd7251f9" May 15 10:39:05.913887 env[1202]: time="2025-05-15T10:39:05.913833406Z" level=error msg="Failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.914398 env[1202]: time="2025-05-15T10:39:05.914372978Z" level=error msg="encountered an error cleaning up failed sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.914573 env[1202]: time="2025-05-15T10:39:05.914545542Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f7ddb74b-w96td,Uid:38e13e26-0f53-4fa0-b34d-bef637b8c73d,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.915294 kubelet[2038]: E0515 10:39:05.915176 2038 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.915294 kubelet[2038]: E0515 10:39:05.915248 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" May 15 10:39:05.915294 kubelet[2038]: E0515 10:39:05.915269 2038 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" May 15 10:39:05.915410 kubelet[2038]: E0515 10:39:05.915317 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-57f7ddb74b-w96td_calico-apiserver(38e13e26-0f53-4fa0-b34d-bef637b8c73d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-57f7ddb74b-w96td_calico-apiserver(38e13e26-0f53-4fa0-b34d-bef637b8c73d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" podUID="38e13e26-0f53-4fa0-b34d-bef637b8c73d" May 15 10:39:05.934699 env[1202]: time="2025-05-15T10:39:05.934628282Z" level=error msg="Failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.935047 env[1202]: time="2025-05-15T10:39:05.935015999Z" level=error msg="encountered an error cleaning up failed sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.935140 env[1202]: time="2025-05-15T10:39:05.935082994Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-km746,Uid:d599ad29-ab1c-4f94-a799-31f081a7cdec,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.935273 env[1202]: time="2025-05-15T10:39:05.935245880Z" level=error msg="Failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.935406 kubelet[2038]: E0515 10:39:05.935369 2038 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.935491 kubelet[2038]: E0515 10:39:05.935425 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-km746" May 15 10:39:05.935491 kubelet[2038]: E0515 10:39:05.935444 2038 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-km746" May 15 10:39:05.935491 kubelet[2038]: E0515 10:39:05.935481 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-km746_kube-system(d599ad29-ab1c-4f94-a799-31f081a7cdec)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-km746_kube-system(d599ad29-ab1c-4f94-a799-31f081a7cdec)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-km746" podUID="d599ad29-ab1c-4f94-a799-31f081a7cdec" May 15 10:39:05.935658 env[1202]: time="2025-05-15T10:39:05.935469199Z" level=error msg="encountered an error cleaning up failed sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.935658 env[1202]: time="2025-05-15T10:39:05.935496590Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-d5ptl,Uid:977383d6-9b09-4182-9d9f-aa8e054ab44e,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.935707 kubelet[2038]: E0515 10:39:05.935648 2038 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.935733 kubelet[2038]: E0515 10:39:05.935708 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-d5ptl" May 15 10:39:05.935733 kubelet[2038]: E0515 10:39:05.935726 2038 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-7db6d8ff4d-d5ptl" May 15 10:39:05.935787 kubelet[2038]: E0515 10:39:05.935761 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-7db6d8ff4d-d5ptl_kube-system(977383d6-9b09-4182-9d9f-aa8e054ab44e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-7db6d8ff4d-d5ptl_kube-system(977383d6-9b09-4182-9d9f-aa8e054ab44e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-d5ptl" podUID="977383d6-9b09-4182-9d9f-aa8e054ab44e" May 15 10:39:05.938106 env[1202]: time="2025-05-15T10:39:05.938043344Z" level=error msg="Failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.938660 env[1202]: time="2025-05-15T10:39:05.938598445Z" level=error msg="encountered an error cleaning up failed sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.938735 env[1202]: time="2025-05-15T10:39:05.938706859Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pgdpk,Uid:eef1f6f4-36a9-4963-8ebe-9f756661b798,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.938917 kubelet[2038]: E0515 10:39:05.938892 2038 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.938997 kubelet[2038]: E0515 10:39:05.938925 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pgdpk" May 15 10:39:05.938997 kubelet[2038]: E0515 10:39:05.938941 2038 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-pgdpk" May 15 10:39:05.938997 kubelet[2038]: E0515 10:39:05.938969 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-pgdpk_calico-system(eef1f6f4-36a9-4963-8ebe-9f756661b798)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-pgdpk_calico-system(eef1f6f4-36a9-4963-8ebe-9f756661b798)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:39:05.939853 env[1202]: time="2025-05-15T10:39:05.939812502Z" level=error msg="Failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.940250 env[1202]: time="2025-05-15T10:39:05.940200428Z" level=error msg="encountered an error cleaning up failed sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.940309 env[1202]: time="2025-05-15T10:39:05.940258457Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f7ddb74b-fxxpk,Uid:af843951-e0be-4fdf-bf7c-7b61c7a66c0c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.940455 kubelet[2038]: E0515 10:39:05.940423 2038 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:05.940529 kubelet[2038]: E0515 10:39:05.940471 2038 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" May 15 10:39:05.940529 kubelet[2038]: E0515 10:39:05.940490 2038 kuberuntime_manager.go:1166] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" May 15 10:39:05.940588 kubelet[2038]: E0515 10:39:05.940526 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-57f7ddb74b-fxxpk_calico-apiserver(af843951-e0be-4fdf-bf7c-7b61c7a66c0c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-57f7ddb74b-fxxpk_calico-apiserver(af843951-e0be-4fdf-bf7c-7b61c7a66c0c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" podUID="af843951-e0be-4fdf-bf7c-7b61c7a66c0c" May 15 10:39:06.135706 kubelet[2038]: I0515 10:39:06.135664 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:06.136765 env[1202]: time="2025-05-15T10:39:06.136720220Z" level=info msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" May 15 10:39:06.137484 kubelet[2038]: I0515 10:39:06.137428 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:06.138292 env[1202]: time="2025-05-15T10:39:06.138259876Z" level=info msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" May 15 10:39:06.141373 kubelet[2038]: I0515 10:39:06.141224 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:06.141964 env[1202]: time="2025-05-15T10:39:06.141929867Z" level=info msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" May 15 10:39:06.142576 kubelet[2038]: I0515 10:39:06.142541 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:06.143042 env[1202]: time="2025-05-15T10:39:06.143019250Z" level=info msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" May 15 10:39:06.143696 kubelet[2038]: I0515 10:39:06.143677 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:39:06.144049 env[1202]: time="2025-05-15T10:39:06.144025135Z" level=info msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" May 15 10:39:06.144764 kubelet[2038]: I0515 10:39:06.144744 2038 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:06.145108 env[1202]: time="2025-05-15T10:39:06.145060506Z" level=info msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" May 15 10:39:06.178156 env[1202]: time="2025-05-15T10:39:06.177029942Z" level=error msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" failed" error="failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:06.178356 kubelet[2038]: E0515 10:39:06.177317 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:39:06.178356 kubelet[2038]: E0515 10:39:06.177372 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35"} May 15 10:39:06.178356 kubelet[2038]: E0515 10:39:06.177439 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:06.178356 kubelet[2038]: E0515 10:39:06.177469 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" podUID="38e13e26-0f53-4fa0-b34d-bef637b8c73d" May 15 10:39:06.189306 env[1202]: time="2025-05-15T10:39:06.189248510Z" level=error msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" failed" error="failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:06.189507 kubelet[2038]: E0515 10:39:06.189473 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:06.189663 kubelet[2038]: E0515 10:39:06.189520 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd"} May 15 10:39:06.189663 kubelet[2038]: E0515 10:39:06.189555 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:06.189663 kubelet[2038]: E0515 10:39:06.189578 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" podUID="af843951-e0be-4fdf-bf7c-7b61c7a66c0c" May 15 10:39:06.190045 env[1202]: time="2025-05-15T10:39:06.190012021Z" level=error msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" failed" error="failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:06.190373 kubelet[2038]: E0515 10:39:06.190247 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:06.190373 kubelet[2038]: E0515 10:39:06.190279 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f"} May 15 10:39:06.190373 kubelet[2038]: E0515 10:39:06.190305 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"977383d6-9b09-4182-9d9f-aa8e054ab44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:06.190373 kubelet[2038]: E0515 10:39:06.190335 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"977383d6-9b09-4182-9d9f-aa8e054ab44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-d5ptl" podUID="977383d6-9b09-4182-9d9f-aa8e054ab44e" May 15 10:39:06.206384 env[1202]: time="2025-05-15T10:39:06.206323882Z" level=error msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" failed" error="failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:06.206576 kubelet[2038]: E0515 10:39:06.206542 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:06.206766 kubelet[2038]: E0515 10:39:06.206588 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7"} May 15 10:39:06.206766 kubelet[2038]: E0515 10:39:06.206624 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:06.206766 kubelet[2038]: E0515 10:39:06.206652 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" podUID="a549a8f9-4c84-43d4-aeaf-975efd7251f9" May 15 10:39:06.209392 env[1202]: time="2025-05-15T10:39:06.209350216Z" level=error msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" failed" error="failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:06.209606 kubelet[2038]: E0515 10:39:06.209564 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:06.209668 kubelet[2038]: E0515 10:39:06.209620 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0"} May 15 10:39:06.209668 kubelet[2038]: E0515 10:39:06.209650 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d599ad29-ab1c-4f94-a799-31f081a7cdec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:06.209754 kubelet[2038]: E0515 10:39:06.209672 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d599ad29-ab1c-4f94-a799-31f081a7cdec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-km746" podUID="d599ad29-ab1c-4f94-a799-31f081a7cdec" May 15 10:39:06.209848 env[1202]: time="2025-05-15T10:39:06.209801863Z" level=error msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" failed" error="failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:06.210020 kubelet[2038]: E0515 10:39:06.209986 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:06.210078 kubelet[2038]: E0515 10:39:06.210027 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc"} May 15 10:39:06.210078 kubelet[2038]: E0515 10:39:06.210046 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eef1f6f4-36a9-4963-8ebe-9f756661b798\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:06.210078 kubelet[2038]: E0515 10:39:06.210062 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eef1f6f4-36a9-4963-8ebe-9f756661b798\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:39:06.747436 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7-shm.mount: Deactivated successfully. May 15 10:39:06.747521 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f-shm.mount: Deactivated successfully. May 15 10:39:06.747580 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35-shm.mount: Deactivated successfully. May 15 10:39:06.747638 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0-shm.mount: Deactivated successfully. May 15 10:39:07.799145 systemd[1]: Started sshd@10-10.0.0.44:22-10.0.0.1:46346.service. May 15 10:39:07.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.44:22-10.0.0.1:46346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:07.800766 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 10:39:07.800869 kernel: audit: type=1130 audit(1747305547.798:1020): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.44:22-10.0.0.1:46346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:07.852302 kernel: audit: type=1101 audit(1747305547.838:1021): pid=3209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.852466 kernel: audit: type=1103 audit(1747305547.842:1022): pid=3209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.838000 audit[3209]: USER_ACCT pid=3209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.842000 audit[3209]: CRED_ACQ pid=3209 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.852671 sshd[3209]: Accepted publickey for core from 10.0.0.1 port 46346 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:07.843756 sshd[3209]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:07.848490 systemd-logind[1192]: New session 11 of user core. May 15 10:39:07.850125 systemd[1]: Started session-11.scope. May 15 10:39:07.842000 audit[3209]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3e578e60 a2=3 a3=0 items=0 ppid=1 pid=3209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:07.863673 kernel: audit: type=1006 audit(1747305547.842:1023): pid=3209 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 10:39:07.863805 kernel: audit: type=1300 audit(1747305547.842:1023): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc3e578e60 a2=3 a3=0 items=0 ppid=1 pid=3209 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:07.863827 kernel: audit: type=1327 audit(1747305547.842:1023): proctitle=737368643A20636F7265205B707269765D May 15 10:39:07.842000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:07.852000 audit[3209]: USER_START pid=3209 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.873578 kernel: audit: type=1105 audit(1747305547.852:1024): pid=3209 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.857000 audit[3211]: CRED_ACQ pid=3211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.879346 kernel: audit: type=1103 audit(1747305547.857:1025): pid=3211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.990276 sshd[3209]: pam_unix(sshd:session): session closed for user core May 15 10:39:07.990000 audit[3209]: USER_END pid=3209 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.993728 systemd[1]: sshd@10-10.0.0.44:22-10.0.0.1:46346.service: Deactivated successfully. May 15 10:39:07.994620 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:39:07.995647 systemd-logind[1192]: Session 11 logged out. Waiting for processes to exit. May 15 10:39:07.996443 systemd-logind[1192]: Removed session 11. May 15 10:39:07.990000 audit[3209]: CRED_DISP pid=3209 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:08.004862 kernel: audit: type=1106 audit(1747305547.990:1026): pid=3209 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:08.004918 kernel: audit: type=1104 audit(1747305547.990:1027): pid=3209 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:07.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.44:22-10.0.0.1:46346 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:12.628967 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3227459720.mount: Deactivated successfully. May 15 10:39:12.994886 systemd[1]: Started sshd@11-10.0.0.44:22-10.0.0.1:51006.service. May 15 10:39:12.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.44:22-10.0.0.1:51006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:12.996445 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:39:12.996501 kernel: audit: type=1130 audit(1747305552.993:1029): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.44:22-10.0.0.1:51006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:13.630104 kubelet[2038]: I0515 10:39:13.630037 2038 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:39:13.630775 kubelet[2038]: E0515 10:39:13.630755 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:14.831487 kubelet[2038]: E0515 10:39:14.831448 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:14.856000 audit[3226]: USER_ACCT pid=3226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:14.857476 sshd[3226]: Accepted publickey for core from 10.0.0.1 port 51006 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:14.860000 audit[3226]: CRED_ACQ pid=3226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:14.864247 sshd[3226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:14.866205 kernel: audit: type=1101 audit(1747305554.856:1030): pid=3226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:14.866291 kernel: audit: type=1103 audit(1747305554.860:1031): pid=3226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:14.866323 kernel: audit: type=1006 audit(1747305554.860:1032): pid=3226 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 May 15 10:39:14.868329 systemd-logind[1192]: New session 12 of user core. May 15 10:39:14.868877 kernel: audit: type=1300 audit(1747305554.860:1032): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe98d0c050 a2=3 a3=0 items=0 ppid=1 pid=3226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:14.860000 audit[3226]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe98d0c050 a2=3 a3=0 items=0 ppid=1 pid=3226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:14.869467 systemd[1]: Started session-12.scope. May 15 10:39:14.860000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:14.875110 kernel: audit: type=1327 audit(1747305554.860:1032): proctitle=737368643A20636F7265205B707269765D May 15 10:39:14.875000 audit[3226]: USER_START pid=3226 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:14.876000 audit[3228]: CRED_ACQ pid=3228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:14.888689 kernel: audit: type=1105 audit(1747305554.875:1033): pid=3226 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:14.888752 kernel: audit: type=1103 audit(1747305554.876:1034): pid=3228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:14.962762 env[1202]: time="2025-05-15T10:39:14.962697319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:14.999741 env[1202]: time="2025-05-15T10:39:14.999675670Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:15.003032 sshd[3226]: pam_unix(sshd:session): session closed for user core May 15 10:39:15.006829 systemd[1]: sshd@11-10.0.0.44:22-10.0.0.1:51006.service: Deactivated successfully. May 15 10:39:15.003000 audit[3226]: USER_END pid=3226 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.008561 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:39:15.009228 systemd-logind[1192]: Session 12 logged out. Waiting for processes to exit. May 15 10:39:15.012606 systemd[1]: Started sshd@12-10.0.0.44:22-10.0.0.1:51018.service. May 15 10:39:15.003000 audit[3226]: CRED_DISP pid=3226 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.017164 kernel: audit: type=1106 audit(1747305555.003:1035): pid=3226 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.017216 kernel: audit: type=1104 audit(1747305555.003:1036): pid=3226 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.44:22-10.0.0.1:51006 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:15.011000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.44:22-10.0.0.1:51018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:15.018501 systemd-logind[1192]: Removed session 12. May 15 10:39:15.021427 env[1202]: time="2025-05-15T10:39:15.021367100Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:15.046000 audit[3241]: USER_ACCT pid=3241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.048010 sshd[3241]: Accepted publickey for core from 10.0.0.1 port 51018 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:15.047000 audit[3241]: CRED_ACQ pid=3241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.047000 audit[3241]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd9cb9aea0 a2=3 a3=0 items=0 ppid=1 pid=3241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:15.047000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:15.048876 sshd[3241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:15.052462 systemd-logind[1192]: New session 13 of user core. May 15 10:39:15.053406 systemd[1]: Started session-13.scope. May 15 10:39:15.057000 audit[3241]: USER_START pid=3241 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.058000 audit[3243]: CRED_ACQ pid=3243 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.065986 env[1202]: time="2025-05-15T10:39:15.065947625Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:15.066521 env[1202]: time="2025-05-15T10:39:15.066495271Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 10:39:15.077905 env[1202]: time="2025-05-15T10:39:15.077850812Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:39:15.352000 audit[3253]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=3253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:15.352000 audit[3253]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd07b6b850 a2=0 a3=7ffd07b6b83c items=0 ppid=2237 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:15.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:15.357000 audit[3253]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3253 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:15.357000 audit[3253]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd07b6b850 a2=0 a3=7ffd07b6b83c items=0 ppid=2237 pid=3253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:15.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:15.398668 systemd[1]: Started sshd@13-10.0.0.44:22-10.0.0.1:51032.service. May 15 10:39:15.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.44:22-10.0.0.1:51032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:15.542748 sshd[3241]: pam_unix(sshd:session): session closed for user core May 15 10:39:15.543000 audit[3241]: USER_END pid=3241 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.543000 audit[3241]: CRED_DISP pid=3241 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.546205 systemd[1]: sshd@12-10.0.0.44:22-10.0.0.1:51018.service: Deactivated successfully. May 15 10:39:15.545000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.44:22-10.0.0.1:51018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:15.546991 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:39:15.547730 systemd-logind[1192]: Session 13 logged out. Waiting for processes to exit. May 15 10:39:15.548567 systemd-logind[1192]: Removed session 13. May 15 10:39:15.631000 audit[3258]: USER_ACCT pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.632528 sshd[3258]: Accepted publickey for core from 10.0.0.1 port 51032 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:15.632000 audit[3258]: CRED_ACQ pid=3258 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.632000 audit[3258]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff77cc9520 a2=3 a3=0 items=0 ppid=1 pid=3258 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:15.632000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:15.634333 sshd[3258]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:15.652228 systemd-logind[1192]: New session 14 of user core. May 15 10:39:15.653075 systemd[1]: Started session-14.scope. May 15 10:39:15.658000 audit[3258]: USER_START pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.660000 audit[3261]: CRED_ACQ pid=3261 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.710872 env[1202]: time="2025-05-15T10:39:15.710806235Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219\"" May 15 10:39:15.711672 env[1202]: time="2025-05-15T10:39:15.711624259Z" level=info msg="StartContainer for \"05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219\"" May 15 10:39:15.728854 systemd[1]: Started cri-containerd-05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219.scope. May 15 10:39:15.752000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.752000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f2e32196178 items=0 ppid=2506 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:15.752000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303332383934393636656165393161623132646232323733326330 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit: BPF prog-id=136 op=LOAD May 15 10:39:15.753000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000218948 items=0 ppid=2506 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:15.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303332383934393636656165393161623132646232323733326330 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit: BPF prog-id=137 op=LOAD May 15 10:39:15.753000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000218998 items=0 ppid=2506 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:15.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303332383934393636656165393161623132646232323733326330 May 15 10:39:15.753000 audit: BPF prog-id=137 op=UNLOAD May 15 10:39:15.753000 audit: BPF prog-id=136 op=UNLOAD May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { perfmon } for pid=3275 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit[3275]: AVC avc: denied { bpf } for pid=3275 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:15.753000 audit: BPF prog-id=138 op=LOAD May 15 10:39:15.753000 audit[3275]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000218a28 items=0 ppid=2506 pid=3275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:15.753000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3035303332383934393636656165393161623132646232323733326330 May 15 10:39:15.962127 sshd[3258]: pam_unix(sshd:session): session closed for user core May 15 10:39:15.961000 audit[3258]: USER_END pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:15.962000 audit[3258]: CRED_DISP pid=3258 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:16.075337 systemd[1]: sshd@13-10.0.0.44:22-10.0.0.1:51032.service: Deactivated successfully. May 15 10:39:16.076017 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:39:16.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.44:22-10.0.0.1:51032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:16.077015 systemd-logind[1192]: Session 14 logged out. Waiting for processes to exit. May 15 10:39:16.077858 systemd-logind[1192]: Removed session 14. May 15 10:39:16.078597 env[1202]: time="2025-05-15T10:39:16.078543916Z" level=info msg="StartContainer for \"05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219\" returns successfully" May 15 10:39:16.084081 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:39:16.084199 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:39:16.102482 systemd[1]: cri-containerd-05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219.scope: Deactivated successfully. May 15 10:39:16.105000 audit: BPF prog-id=138 op=UNLOAD May 15 10:39:16.118937 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219-rootfs.mount: Deactivated successfully. May 15 10:39:16.169073 env[1202]: time="2025-05-15T10:39:16.169019562Z" level=info msg="shim disconnected" id=05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219 May 15 10:39:16.169073 env[1202]: time="2025-05-15T10:39:16.169071870Z" level=warning msg="cleaning up after shim disconnected" id=05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219 namespace=k8s.io May 15 10:39:16.169317 env[1202]: time="2025-05-15T10:39:16.169086126Z" level=info msg="cleaning up dead shim" May 15 10:39:16.171497 kubelet[2038]: E0515 10:39:16.171456 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:16.175846 env[1202]: time="2025-05-15T10:39:16.175775739Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:16Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3327 runtime=io.containerd.runc.v2\ntime=\"2025-05-15T10:39:16Z\" level=warning msg=\"failed to remove runc container\" error=\"runc did not terminate successfully: exit status 255: \" runtime=io.containerd.runc.v2\n" May 15 10:39:16.972844 env[1202]: time="2025-05-15T10:39:16.972774409Z" level=info msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" May 15 10:39:16.973332 env[1202]: time="2025-05-15T10:39:16.973294154Z" level=info msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" May 15 10:39:16.998630 env[1202]: time="2025-05-15T10:39:16.998552431Z" level=error msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" failed" error="failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.998859 kubelet[2038]: E0515 10:39:16.998795 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:16.998921 kubelet[2038]: E0515 10:39:16.998865 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc"} May 15 10:39:16.998921 kubelet[2038]: E0515 10:39:16.998900 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eef1f6f4-36a9-4963-8ebe-9f756661b798\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:16.999024 kubelet[2038]: E0515 10:39:16.998926 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eef1f6f4-36a9-4963-8ebe-9f756661b798\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:39:16.999371 env[1202]: time="2025-05-15T10:39:16.999317636Z" level=error msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" failed" error="failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:16.999510 kubelet[2038]: E0515 10:39:16.999477 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:16.999577 kubelet[2038]: E0515 10:39:16.999510 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0"} May 15 10:39:16.999577 kubelet[2038]: E0515 10:39:16.999533 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d599ad29-ab1c-4f94-a799-31f081a7cdec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:16.999577 kubelet[2038]: E0515 10:39:16.999553 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d599ad29-ab1c-4f94-a799-31f081a7cdec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-km746" podUID="d599ad29-ab1c-4f94-a799-31f081a7cdec" May 15 10:39:17.174739 kubelet[2038]: I0515 10:39:17.174707 2038 scope.go:117] "RemoveContainer" containerID="05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219" May 15 10:39:17.175204 kubelet[2038]: E0515 10:39:17.174781 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:17.176903 env[1202]: time="2025-05-15T10:39:17.176862113Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for container &ContainerMetadata{Name:calico-node,Attempt:1,}" May 15 10:39:17.300381 env[1202]: time="2025-05-15T10:39:17.300243595Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for &ContainerMetadata{Name:calico-node,Attempt:1,} returns container id \"5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601\"" May 15 10:39:17.301014 env[1202]: time="2025-05-15T10:39:17.300966211Z" level=info msg="StartContainer for \"5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601\"" May 15 10:39:17.318262 systemd[1]: Started cri-containerd-5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601.scope. May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7efe0c6ee4d8 items=0 ppid=2506 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333630376231393132333165613432613661643639303137656339 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit: BPF prog-id=139 op=LOAD May 15 10:39:17.334000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002349d8 items=0 ppid=2506 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333630376231393132333165613432613661643639303137656339 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit: BPF prog-id=140 op=LOAD May 15 10:39:17.334000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000234a28 items=0 ppid=2506 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333630376231393132333165613432613661643639303137656339 May 15 10:39:17.334000 audit: BPF prog-id=140 op=UNLOAD May 15 10:39:17.334000 audit: BPF prog-id=139 op=UNLOAD May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { perfmon } for pid=3394 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit[3394]: AVC avc: denied { bpf } for pid=3394 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:17.334000 audit: BPF prog-id=141 op=LOAD May 15 10:39:17.334000 audit[3394]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000234ab8 items=0 ppid=2506 pid=3394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:17.334000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563333630376231393132333165613432613661643639303137656339 May 15 10:39:17.389601 env[1202]: time="2025-05-15T10:39:17.389532367Z" level=info msg="StartContainer for \"5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601\" returns successfully" May 15 10:39:17.437987 systemd[1]: cri-containerd-5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601.scope: Deactivated successfully. May 15 10:39:17.442000 audit: BPF prog-id=141 op=UNLOAD May 15 10:39:17.457348 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601-rootfs.mount: Deactivated successfully. May 15 10:39:17.510162 env[1202]: time="2025-05-15T10:39:17.510109462Z" level=info msg="shim disconnected" id=5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601 May 15 10:39:17.510162 env[1202]: time="2025-05-15T10:39:17.510160618Z" level=warning msg="cleaning up after shim disconnected" id=5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601 namespace=k8s.io May 15 10:39:17.510162 env[1202]: time="2025-05-15T10:39:17.510169925Z" level=info msg="cleaning up dead shim" May 15 10:39:17.517269 env[1202]: time="2025-05-15T10:39:17.517212420Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:17Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3438 runtime=io.containerd.runc.v2\n" May 15 10:39:18.178012 kubelet[2038]: I0515 10:39:18.177980 2038 scope.go:117] "RemoveContainer" containerID="05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219" May 15 10:39:18.178447 kubelet[2038]: I0515 10:39:18.178297 2038 scope.go:117] "RemoveContainer" containerID="5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601" May 15 10:39:18.178447 kubelet[2038]: E0515 10:39:18.178345 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:18.179029 env[1202]: time="2025-05-15T10:39:18.179000096Z" level=info msg="RemoveContainer for \"05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219\"" May 15 10:39:18.181602 kubelet[2038]: E0515 10:39:18.181576 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-zmkdz_calico-system(91c49c6b-c8f2-4e34-9258-1d7f99a2b855)\"" pod="calico-system/calico-node-zmkdz" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" May 15 10:39:18.202052 env[1202]: time="2025-05-15T10:39:18.202003127Z" level=info msg="RemoveContainer for \"05032894966eae91ab12db22732c0dd3da58883357558b7ff8843a23a2cf8219\" returns successfully" May 15 10:39:19.211806 kubelet[2038]: I0515 10:39:19.203663 2038 scope.go:117] "RemoveContainer" containerID="5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601" May 15 10:39:19.211806 kubelet[2038]: E0515 10:39:19.206882 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:19.215247 kubelet[2038]: E0515 10:39:19.215153 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 10s restarting failed container=calico-node pod=calico-node-zmkdz_calico-system(91c49c6b-c8f2-4e34-9258-1d7f99a2b855)\"" pod="calico-system/calico-node-zmkdz" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" May 15 10:39:19.973046 env[1202]: time="2025-05-15T10:39:19.972589322Z" level=info msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" May 15 10:39:19.973046 env[1202]: time="2025-05-15T10:39:19.972589342Z" level=info msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" May 15 10:39:19.973046 env[1202]: time="2025-05-15T10:39:19.972589502Z" level=info msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" May 15 10:39:19.973046 env[1202]: time="2025-05-15T10:39:19.972664082Z" level=info msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" May 15 10:39:20.006453 env[1202]: time="2025-05-15T10:39:20.006384235Z" level=error msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" failed" error="failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.006617 kubelet[2038]: E0515 10:39:20.006569 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:20.006787 kubelet[2038]: E0515 10:39:20.006621 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f"} May 15 10:39:20.006787 kubelet[2038]: E0515 10:39:20.006662 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"977383d6-9b09-4182-9d9f-aa8e054ab44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.006787 kubelet[2038]: E0515 10:39:20.006699 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"977383d6-9b09-4182-9d9f-aa8e054ab44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-d5ptl" podUID="977383d6-9b09-4182-9d9f-aa8e054ab44e" May 15 10:39:20.007850 env[1202]: time="2025-05-15T10:39:20.007803787Z" level=error msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" failed" error="failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.007964 kubelet[2038]: E0515 10:39:20.007931 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:20.008044 kubelet[2038]: E0515 10:39:20.007969 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd"} May 15 10:39:20.008044 kubelet[2038]: E0515 10:39:20.007997 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.008044 kubelet[2038]: E0515 10:39:20.008021 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" podUID="af843951-e0be-4fdf-bf7c-7b61c7a66c0c" May 15 10:39:20.019083 env[1202]: time="2025-05-15T10:39:20.019006622Z" level=error msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" failed" error="failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.019329 kubelet[2038]: E0515 10:39:20.019283 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:39:20.019423 kubelet[2038]: E0515 10:39:20.019339 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35"} May 15 10:39:20.019423 kubelet[2038]: E0515 10:39:20.019376 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.019423 kubelet[2038]: E0515 10:39:20.019398 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" podUID="38e13e26-0f53-4fa0-b34d-bef637b8c73d" May 15 10:39:20.021146 env[1202]: time="2025-05-15T10:39:20.021087363Z" level=error msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" failed" error="failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:20.021323 kubelet[2038]: E0515 10:39:20.021294 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:20.021323 kubelet[2038]: E0515 10:39:20.021322 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7"} May 15 10:39:20.021422 kubelet[2038]: E0515 10:39:20.021340 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:20.021422 kubelet[2038]: E0515 10:39:20.021356 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" podUID="a549a8f9-4c84-43d4-aeaf-975efd7251f9" May 15 10:39:20.965920 systemd[1]: Started sshd@14-10.0.0.44:22-10.0.0.1:44946.service. May 15 10:39:20.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.44:22-10.0.0.1:44946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:20.971425 kernel: kauditd_printk_skb: 117 callbacks suppressed May 15 10:39:20.971493 kernel: audit: type=1130 audit(1747305560.964:1072): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.44:22-10.0.0.1:44946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:21.001000 audit[3545]: USER_ACCT pid=3545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.002991 sshd[3545]: Accepted publickey for core from 10.0.0.1 port 44946 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:21.005000 audit[3545]: CRED_ACQ pid=3545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.007291 sshd[3545]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:21.010841 systemd-logind[1192]: New session 15 of user core. May 15 10:39:21.011367 kernel: audit: type=1101 audit(1747305561.001:1073): pid=3545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.011397 kernel: audit: type=1103 audit(1747305561.005:1074): pid=3545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.011414 kernel: audit: type=1006 audit(1747305561.005:1075): pid=3545 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 10:39:21.011892 systemd[1]: Started session-15.scope. May 15 10:39:21.005000 audit[3545]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff89f8ba90 a2=3 a3=0 items=0 ppid=1 pid=3545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.018531 kernel: audit: type=1300 audit(1747305561.005:1075): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff89f8ba90 a2=3 a3=0 items=0 ppid=1 pid=3545 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.018603 kernel: audit: type=1327 audit(1747305561.005:1075): proctitle=737368643A20636F7265205B707269765D May 15 10:39:21.005000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:21.019897 kernel: audit: type=1105 audit(1747305561.015:1076): pid=3545 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.015000 audit[3545]: USER_START pid=3545 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.016000 audit[3547]: CRED_ACQ pid=3547 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.027714 kernel: audit: type=1103 audit(1747305561.016:1077): pid=3547 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.116036 sshd[3545]: pam_unix(sshd:session): session closed for user core May 15 10:39:21.115000 audit[3545]: USER_END pid=3545 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.118830 systemd[1]: sshd@14-10.0.0.44:22-10.0.0.1:44946.service: Deactivated successfully. May 15 10:39:21.119647 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:39:21.120319 systemd-logind[1192]: Session 15 logged out. Waiting for processes to exit. May 15 10:39:21.121076 systemd-logind[1192]: Removed session 15. May 15 10:39:21.116000 audit[3545]: CRED_DISP pid=3545 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.125945 kernel: audit: type=1106 audit(1747305561.115:1078): pid=3545 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.125996 kernel: audit: type=1104 audit(1747305561.116:1079): pid=3545 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:21.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.44:22-10.0.0.1:44946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:21.927000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:21.927000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:21.927000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00284d620 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:39:21.927000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c003434e00 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:39:21.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:21.927000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:22.426000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:22.426000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:22.426000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:22.426000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006cef620 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:39:22.426000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c006deff50 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:39:22.426000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:22.426000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:22.427000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:22.427000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0059bab10 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:39:22.427000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:22.426000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0070972f0 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:39:22.426000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:22.428000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:22.428000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c006cef6a0 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:39:22.428000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:22.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:22.428000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0059bac60 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:39:22.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:26.120894 systemd[1]: Started sshd@15-10.0.0.44:22-10.0.0.1:44960.service. May 15 10:39:26.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.44:22-10.0.0.1:44960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:26.122324 kernel: kauditd_printk_skb: 25 callbacks suppressed May 15 10:39:26.122461 kernel: audit: type=1130 audit(1747305566.119:1089): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.44:22-10.0.0.1:44960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:26.153000 audit[3560]: USER_ACCT pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.154684 sshd[3560]: Accepted publickey for core from 10.0.0.1 port 44960 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:26.156494 sshd[3560]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:26.159126 kernel: audit: type=1101 audit(1747305566.153:1090): pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.159222 kernel: audit: type=1103 audit(1747305566.155:1091): pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.155000 audit[3560]: CRED_ACQ pid=3560 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.160419 systemd-logind[1192]: New session 16 of user core. May 15 10:39:26.161663 systemd[1]: Started session-16.scope. May 15 10:39:26.166114 kernel: audit: type=1006 audit(1747305566.155:1092): pid=3560 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 10:39:26.166150 kernel: audit: type=1300 audit(1747305566.155:1092): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5ef85a00 a2=3 a3=0 items=0 ppid=1 pid=3560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:26.155000 audit[3560]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5ef85a00 a2=3 a3=0 items=0 ppid=1 pid=3560 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:26.170885 kernel: audit: type=1327 audit(1747305566.155:1092): proctitle=737368643A20636F7265205B707269765D May 15 10:39:26.155000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:26.172453 kernel: audit: type=1105 audit(1747305566.164:1093): pid=3560 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.164000 audit[3560]: USER_START pid=3560 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.166000 audit[3562]: CRED_ACQ pid=3562 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.181492 kernel: audit: type=1103 audit(1747305566.166:1094): pid=3562 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.282306 sshd[3560]: pam_unix(sshd:session): session closed for user core May 15 10:39:26.282000 audit[3560]: USER_END pid=3560 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.284573 systemd[1]: sshd@15-10.0.0.44:22-10.0.0.1:44960.service: Deactivated successfully. May 15 10:39:26.285450 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:39:26.286708 systemd-logind[1192]: Session 16 logged out. Waiting for processes to exit. May 15 10:39:26.287512 systemd-logind[1192]: Removed session 16. May 15 10:39:26.282000 audit[3560]: CRED_DISP pid=3560 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.292564 kernel: audit: type=1106 audit(1747305566.282:1095): pid=3560 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.292647 kernel: audit: type=1104 audit(1747305566.282:1096): pid=3560 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:26.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.44:22-10.0.0.1:44960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:28.972122 env[1202]: time="2025-05-15T10:39:28.972045490Z" level=info msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" May 15 10:39:28.998487 env[1202]: time="2025-05-15T10:39:28.998404341Z" level=error msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" failed" error="failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:28.998755 kubelet[2038]: E0515 10:39:28.998683 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:28.999035 kubelet[2038]: E0515 10:39:28.998767 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0"} May 15 10:39:28.999035 kubelet[2038]: E0515 10:39:28.998812 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d599ad29-ab1c-4f94-a799-31f081a7cdec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:28.999035 kubelet[2038]: E0515 10:39:28.998841 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d599ad29-ab1c-4f94-a799-31f081a7cdec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-km746" podUID="d599ad29-ab1c-4f94-a799-31f081a7cdec" May 15 10:39:29.187243 kubelet[2038]: I0515 10:39:29.187202 2038 scope.go:117] "RemoveContainer" containerID="5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601" May 15 10:39:29.187433 kubelet[2038]: E0515 10:39:29.187293 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:29.190493 env[1202]: time="2025-05-15T10:39:29.190435436Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for container &ContainerMetadata{Name:calico-node,Attempt:2,}" May 15 10:39:29.347357 env[1202]: time="2025-05-15T10:39:29.347221830Z" level=info msg="CreateContainer within sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" for &ContainerMetadata{Name:calico-node,Attempt:2,} returns container id \"d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24\"" May 15 10:39:29.348166 env[1202]: time="2025-05-15T10:39:29.348122865Z" level=info msg="StartContainer for \"d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24\"" May 15 10:39:29.370503 systemd[1]: run-containerd-runc-k8s.io-d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24-runc.g8Zdhu.mount: Deactivated successfully. May 15 10:39:29.372305 systemd[1]: Started cri-containerd-d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24.scope. May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7f625450d848 items=0 ppid=2506 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:29.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393830653264316630326532626237633433626565323065663834 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit: BPF prog-id=142 op=LOAD May 15 10:39:29.386000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002a2208 items=0 ppid=2506 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:29.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393830653264316630326532626237633433626565323065663834 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit: BPF prog-id=143 op=LOAD May 15 10:39:29.386000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0002a2258 items=0 ppid=2506 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:29.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393830653264316630326532626237633433626565323065663834 May 15 10:39:29.386000 audit: BPF prog-id=143 op=UNLOAD May 15 10:39:29.386000 audit: BPF prog-id=142 op=UNLOAD May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { perfmon } for pid=3601 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit[3601]: AVC avc: denied { bpf } for pid=3601 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:29.386000 audit: BPF prog-id=144 op=LOAD May 15 10:39:29.386000 audit[3601]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002a22e8 items=0 ppid=2506 pid=3601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:29.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431393830653264316630326532626237633433626565323065663834 May 15 10:39:29.405144 env[1202]: time="2025-05-15T10:39:29.402314369Z" level=info msg="StartContainer for \"d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24\" returns successfully" May 15 10:39:29.456758 systemd[1]: cri-containerd-d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24.scope: Deactivated successfully. May 15 10:39:29.460000 audit: BPF prog-id=144 op=UNLOAD May 15 10:39:29.478602 env[1202]: time="2025-05-15T10:39:29.478535356Z" level=info msg="shim disconnected" id=d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24 May 15 10:39:29.478602 env[1202]: time="2025-05-15T10:39:29.478592316Z" level=warning msg="cleaning up after shim disconnected" id=d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24 namespace=k8s.io May 15 10:39:29.478602 env[1202]: time="2025-05-15T10:39:29.478604019Z" level=info msg="cleaning up dead shim" May 15 10:39:29.485628 env[1202]: time="2025-05-15T10:39:29.485556030Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:29Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3645 runtime=io.containerd.runc.v2\n" May 15 10:39:29.972462 env[1202]: time="2025-05-15T10:39:29.972355325Z" level=info msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" May 15 10:39:29.994528 env[1202]: time="2025-05-15T10:39:29.994468981Z" level=error msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" failed" error="failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:29.994688 kubelet[2038]: E0515 10:39:29.994654 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:29.994750 kubelet[2038]: E0515 10:39:29.994705 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc"} May 15 10:39:29.994750 kubelet[2038]: E0515 10:39:29.994736 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eef1f6f4-36a9-4963-8ebe-9f756661b798\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:29.994839 kubelet[2038]: E0515 10:39:29.994759 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eef1f6f4-36a9-4963-8ebe-9f756661b798\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:39:30.223890 kubelet[2038]: I0515 10:39:30.223779 2038 scope.go:117] "RemoveContainer" containerID="5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601" May 15 10:39:30.224303 kubelet[2038]: I0515 10:39:30.224167 2038 scope.go:117] "RemoveContainer" containerID="d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24" May 15 10:39:30.224303 kubelet[2038]: E0515 10:39:30.224228 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:30.224644 kubelet[2038]: E0515 10:39:30.224611 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-zmkdz_calico-system(91c49c6b-c8f2-4e34-9258-1d7f99a2b855)\"" pod="calico-system/calico-node-zmkdz" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" May 15 10:39:30.225469 env[1202]: time="2025-05-15T10:39:30.225437357Z" level=info msg="RemoveContainer for \"5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601\"" May 15 10:39:30.229067 env[1202]: time="2025-05-15T10:39:30.229007960Z" level=info msg="RemoveContainer for \"5c3607b191231ea42a6ad69017ec94b78f48c31686e23102edca10be8a3f6601\" returns successfully" May 15 10:39:30.309497 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24-rootfs.mount: Deactivated successfully. May 15 10:39:31.287635 systemd[1]: Started sshd@16-10.0.0.44:22-10.0.0.1:51908.service. May 15 10:39:31.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.44:22-10.0.0.1:51908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:31.288838 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 10:39:31.288908 kernel: audit: type=1130 audit(1747305571.286:1105): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.44:22-10.0.0.1:51908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:31.329000 audit[3681]: USER_ACCT pid=3681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.330611 sshd[3681]: Accepted publickey for core from 10.0.0.1 port 51908 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:31.332949 sshd[3681]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:31.331000 audit[3681]: CRED_ACQ pid=3681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.337122 systemd-logind[1192]: New session 17 of user core. May 15 10:39:31.338262 kernel: audit: type=1101 audit(1747305571.329:1106): pid=3681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.338308 kernel: audit: type=1103 audit(1747305571.331:1107): pid=3681 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.338340 kernel: audit: type=1006 audit(1747305571.331:1108): pid=3681 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 10:39:31.338305 systemd[1]: Started session-17.scope. May 15 10:39:31.331000 audit[3681]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff76d16800 a2=3 a3=0 items=0 ppid=1 pid=3681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:31.345263 kernel: audit: type=1300 audit(1747305571.331:1108): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff76d16800 a2=3 a3=0 items=0 ppid=1 pid=3681 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:31.331000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:31.346770 kernel: audit: type=1327 audit(1747305571.331:1108): proctitle=737368643A20636F7265205B707269765D May 15 10:39:31.344000 audit[3681]: USER_START pid=3681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.351146 kernel: audit: type=1105 audit(1747305571.344:1109): pid=3681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.351212 kernel: audit: type=1103 audit(1747305571.345:1110): pid=3683 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.345000 audit[3683]: CRED_ACQ pid=3683 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.448128 sshd[3681]: pam_unix(sshd:session): session closed for user core May 15 10:39:31.448000 audit[3681]: USER_END pid=3681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.451168 systemd[1]: sshd@16-10.0.0.44:22-10.0.0.1:51908.service: Deactivated successfully. May 15 10:39:31.452004 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:39:31.452716 systemd-logind[1192]: Session 17 logged out. Waiting for processes to exit. May 15 10:39:31.448000 audit[3681]: CRED_DISP pid=3681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.453659 systemd-logind[1192]: Removed session 17. May 15 10:39:31.456889 kernel: audit: type=1106 audit(1747305571.448:1111): pid=3681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.456939 kernel: audit: type=1104 audit(1747305571.448:1112): pid=3681 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:31.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.44:22-10.0.0.1:51908 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:31.972364 env[1202]: time="2025-05-15T10:39:31.972304817Z" level=info msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" May 15 10:39:31.997290 env[1202]: time="2025-05-15T10:39:31.997236261Z" level=error msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" failed" error="failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:31.997506 kubelet[2038]: E0515 10:39:31.997455 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:39:31.997752 kubelet[2038]: E0515 10:39:31.997513 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35"} May 15 10:39:31.997752 kubelet[2038]: E0515 10:39:31.997550 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:31.997752 kubelet[2038]: E0515 10:39:31.997573 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" podUID="38e13e26-0f53-4fa0-b34d-bef637b8c73d" May 15 10:39:32.971597 env[1202]: time="2025-05-15T10:39:32.971480188Z" level=info msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" May 15 10:39:32.971767 env[1202]: time="2025-05-15T10:39:32.971731471Z" level=info msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" May 15 10:39:32.972390 env[1202]: time="2025-05-15T10:39:32.972124917Z" level=info msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" May 15 10:39:32.996810 env[1202]: time="2025-05-15T10:39:32.996745761Z" level=error msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" failed" error="failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:32.996999 kubelet[2038]: E0515 10:39:32.996960 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:32.997065 kubelet[2038]: E0515 10:39:32.997010 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd"} May 15 10:39:32.997065 kubelet[2038]: E0515 10:39:32.997050 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:32.997169 kubelet[2038]: E0515 10:39:32.997074 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" podUID="af843951-e0be-4fdf-bf7c-7b61c7a66c0c" May 15 10:39:33.003170 env[1202]: time="2025-05-15T10:39:33.003123587Z" level=error msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" failed" error="failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:33.003422 kubelet[2038]: E0515 10:39:33.003354 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:33.003770 kubelet[2038]: E0515 10:39:33.003429 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7"} May 15 10:39:33.003770 kubelet[2038]: E0515 10:39:33.003461 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:33.003770 kubelet[2038]: E0515 10:39:33.003484 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" podUID="a549a8f9-4c84-43d4-aeaf-975efd7251f9" May 15 10:39:33.003891 env[1202]: time="2025-05-15T10:39:33.003807701Z" level=error msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" failed" error="failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:33.003981 kubelet[2038]: E0515 10:39:33.003959 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:33.003981 kubelet[2038]: E0515 10:39:33.003981 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f"} May 15 10:39:33.004052 kubelet[2038]: E0515 10:39:33.003998 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"977383d6-9b09-4182-9d9f-aa8e054ab44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:33.004052 kubelet[2038]: E0515 10:39:33.004014 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"977383d6-9b09-4182-9d9f-aa8e054ab44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-d5ptl" podUID="977383d6-9b09-4182-9d9f-aa8e054ab44e" May 15 10:39:36.453045 systemd[1]: Started sshd@17-10.0.0.44:22-10.0.0.1:51910.service. May 15 10:39:36.457365 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:39:36.457420 kernel: audit: type=1130 audit(1747305576.452:1114): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.44:22-10.0.0.1:51910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:36.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.44:22-10.0.0.1:51910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:36.490000 audit[3793]: USER_ACCT pid=3793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.491504 sshd[3793]: Accepted publickey for core from 10.0.0.1 port 51910 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:36.494000 audit[3793]: CRED_ACQ pid=3793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.495522 sshd[3793]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:36.499269 kernel: audit: type=1101 audit(1747305576.490:1115): pid=3793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.499327 kernel: audit: type=1103 audit(1747305576.494:1116): pid=3793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.499361 kernel: audit: type=1006 audit(1747305576.494:1117): pid=3793 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 10:39:36.498864 systemd-logind[1192]: New session 18 of user core. May 15 10:39:36.499571 systemd[1]: Started session-18.scope. May 15 10:39:36.494000 audit[3793]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf1c3eb60 a2=3 a3=0 items=0 ppid=1 pid=3793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.505052 kernel: audit: type=1300 audit(1747305576.494:1117): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcf1c3eb60 a2=3 a3=0 items=0 ppid=1 pid=3793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:36.505108 kernel: audit: type=1327 audit(1747305576.494:1117): proctitle=737368643A20636F7265205B707269765D May 15 10:39:36.494000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:36.506408 kernel: audit: type=1105 audit(1747305576.502:1118): pid=3793 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.502000 audit[3793]: USER_START pid=3793 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.510571 kernel: audit: type=1103 audit(1747305576.503:1119): pid=3795 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.503000 audit[3795]: CRED_ACQ pid=3795 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.601306 sshd[3793]: pam_unix(sshd:session): session closed for user core May 15 10:39:36.601000 audit[3793]: USER_END pid=3793 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.603863 systemd[1]: sshd@17-10.0.0.44:22-10.0.0.1:51910.service: Deactivated successfully. May 15 10:39:36.604548 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:39:36.605257 systemd-logind[1192]: Session 18 logged out. Waiting for processes to exit. May 15 10:39:36.605948 systemd-logind[1192]: Removed session 18. May 15 10:39:36.601000 audit[3793]: CRED_DISP pid=3793 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.610036 kernel: audit: type=1106 audit(1747305576.601:1120): pid=3793 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.610103 kernel: audit: type=1104 audit(1747305576.601:1121): pid=3793 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:36.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.44:22-10.0.0.1:51910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:37.733000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:37.733000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:37.733000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c003514620 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:39:37.733000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:37.733000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:37.733000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c003434a80 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:39:37.733000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:37.733000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0034c03c0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:39:37.733000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:37.734000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:37.734000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0034c03e0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:39:37.734000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:39.972271 env[1202]: time="2025-05-15T10:39:39.972221296Z" level=info msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" May 15 10:39:39.993993 env[1202]: time="2025-05-15T10:39:39.993937859Z" level=error msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" failed" error="failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:39.994207 kubelet[2038]: E0515 10:39:39.994172 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:39.994583 kubelet[2038]: E0515 10:39:39.994222 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0"} May 15 10:39:39.994583 kubelet[2038]: E0515 10:39:39.994252 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d599ad29-ab1c-4f94-a799-31f081a7cdec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:39.994583 kubelet[2038]: E0515 10:39:39.994273 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d599ad29-ab1c-4f94-a799-31f081a7cdec\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-km746" podUID="d599ad29-ab1c-4f94-a799-31f081a7cdec" May 15 10:39:41.606469 systemd[1]: Started sshd@18-10.0.0.44:22-10.0.0.1:51948.service. May 15 10:39:41.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.44:22-10.0.0.1:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:41.607791 kernel: kauditd_printk_skb: 13 callbacks suppressed May 15 10:39:41.607917 kernel: audit: type=1130 audit(1747305581.605:1127): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.44:22-10.0.0.1:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:41.640000 audit[3834]: USER_ACCT pid=3834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.642229 sshd[3834]: Accepted publickey for core from 10.0.0.1 port 51948 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:41.643488 sshd[3834]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:41.642000 audit[3834]: CRED_ACQ pid=3834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.650358 systemd-logind[1192]: New session 19 of user core. May 15 10:39:41.650957 kernel: audit: type=1101 audit(1747305581.640:1128): pid=3834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.651131 kernel: audit: type=1103 audit(1747305581.642:1129): pid=3834 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.651070 systemd[1]: Started session-19.scope. May 15 10:39:41.642000 audit[3834]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a0aa700 a2=3 a3=0 items=0 ppid=1 pid=3834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.657771 kernel: audit: type=1006 audit(1747305581.642:1130): pid=3834 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 May 15 10:39:41.657811 kernel: audit: type=1300 audit(1747305581.642:1130): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc9a0aa700 a2=3 a3=0 items=0 ppid=1 pid=3834 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:41.657839 kernel: audit: type=1327 audit(1747305581.642:1130): proctitle=737368643A20636F7265205B707269765D May 15 10:39:41.642000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:41.659112 kernel: audit: type=1105 audit(1747305581.654:1131): pid=3834 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.654000 audit[3834]: USER_START pid=3834 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.655000 audit[3836]: CRED_ACQ pid=3836 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.666725 kernel: audit: type=1103 audit(1747305581.655:1132): pid=3836 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.751767 sshd[3834]: pam_unix(sshd:session): session closed for user core May 15 10:39:41.751000 audit[3834]: USER_END pid=3834 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.754344 systemd[1]: sshd@18-10.0.0.44:22-10.0.0.1:51948.service: Deactivated successfully. May 15 10:39:41.755103 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:39:41.755644 systemd-logind[1192]: Session 19 logged out. Waiting for processes to exit. May 15 10:39:41.756400 systemd-logind[1192]: Removed session 19. May 15 10:39:41.751000 audit[3834]: CRED_DISP pid=3834 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.761518 kernel: audit: type=1106 audit(1747305581.751:1133): pid=3834 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.761581 kernel: audit: type=1104 audit(1747305581.751:1134): pid=3834 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:41.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.44:22-10.0.0.1:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:42.972418 env[1202]: time="2025-05-15T10:39:42.972337608Z" level=info msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" May 15 10:39:42.995461 env[1202]: time="2025-05-15T10:39:42.995395000Z" level=error msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" failed" error="failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:42.995700 kubelet[2038]: E0515 10:39:42.995653 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:42.995977 kubelet[2038]: E0515 10:39:42.995711 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc"} May 15 10:39:42.995977 kubelet[2038]: E0515 10:39:42.995742 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eef1f6f4-36a9-4963-8ebe-9f756661b798\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:42.995977 kubelet[2038]: E0515 10:39:42.995764 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eef1f6f4-36a9-4963-8ebe-9f756661b798\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-pgdpk" podUID="eef1f6f4-36a9-4963-8ebe-9f756661b798" May 15 10:39:43.972029 env[1202]: time="2025-05-15T10:39:43.971985584Z" level=info msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" May 15 10:39:43.972343 env[1202]: time="2025-05-15T10:39:43.972019829Z" level=info msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" May 15 10:39:43.995449 env[1202]: time="2025-05-15T10:39:43.995376070Z" level=error msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" failed" error="failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:43.995782 kubelet[2038]: E0515 10:39:43.995639 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:43.995782 kubelet[2038]: E0515 10:39:43.995699 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f"} May 15 10:39:43.995782 kubelet[2038]: E0515 10:39:43.995744 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"977383d6-9b09-4182-9d9f-aa8e054ab44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:43.995782 kubelet[2038]: E0515 10:39:43.995773 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"977383d6-9b09-4182-9d9f-aa8e054ab44e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-7db6d8ff4d-d5ptl" podUID="977383d6-9b09-4182-9d9f-aa8e054ab44e" May 15 10:39:43.996227 env[1202]: time="2025-05-15T10:39:43.996187310Z" level=error msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" failed" error="failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:43.996317 kubelet[2038]: E0515 10:39:43.996296 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:43.996351 kubelet[2038]: E0515 10:39:43.996322 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7"} May 15 10:39:43.996351 kubelet[2038]: E0515 10:39:43.996345 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:43.996425 kubelet[2038]: E0515 10:39:43.996365 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a549a8f9-4c84-43d4-aeaf-975efd7251f9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" podUID="a549a8f9-4c84-43d4-aeaf-975efd7251f9" May 15 10:39:44.972701 kubelet[2038]: I0515 10:39:44.971839 2038 scope.go:117] "RemoveContainer" containerID="d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24" May 15 10:39:44.972701 kubelet[2038]: E0515 10:39:44.971922 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:44.972701 kubelet[2038]: E0515 10:39:44.972435 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"calico-node\" with CrashLoopBackOff: \"back-off 20s restarting failed container=calico-node pod=calico-node-zmkdz_calico-system(91c49c6b-c8f2-4e34-9258-1d7f99a2b855)\"" pod="calico-system/calico-node-zmkdz" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" May 15 10:39:45.972286 env[1202]: time="2025-05-15T10:39:45.972221746Z" level=info msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" May 15 10:39:46.001389 env[1202]: time="2025-05-15T10:39:46.001311616Z" level=error msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" failed" error="failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:46.001638 kubelet[2038]: E0515 10:39:46.001580 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:39:46.001895 kubelet[2038]: E0515 10:39:46.001647 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35"} May 15 10:39:46.001895 kubelet[2038]: E0515 10:39:46.001680 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:46.001895 kubelet[2038]: E0515 10:39:46.001703 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"38e13e26-0f53-4fa0-b34d-bef637b8c73d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" podUID="38e13e26-0f53-4fa0-b34d-bef637b8c73d" May 15 10:39:46.756917 systemd[1]: Started sshd@19-10.0.0.44:22-10.0.0.1:51964.service. May 15 10:39:46.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.44:22-10.0.0.1:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:46.758145 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:39:46.758191 kernel: audit: type=1130 audit(1747305586.755:1136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.44:22-10.0.0.1:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:46.791000 audit[3946]: USER_ACCT pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.793303 sshd[3946]: Accepted publickey for core from 10.0.0.1 port 51964 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:46.796000 audit[3946]: CRED_ACQ pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.798034 sshd[3946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:46.798257 kernel: audit: type=1101 audit(1747305586.791:1137): pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.798303 kernel: audit: type=1103 audit(1747305586.796:1138): pid=3946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.802466 systemd-logind[1192]: New session 20 of user core. May 15 10:39:46.803446 systemd[1]: Started session-20.scope. May 15 10:39:46.804319 kernel: audit: type=1006 audit(1747305586.796:1139): pid=3946 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 May 15 10:39:46.804397 kernel: audit: type=1300 audit(1747305586.796:1139): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd218679a0 a2=3 a3=0 items=0 ppid=1 pid=3946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.796000 audit[3946]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd218679a0 a2=3 a3=0 items=0 ppid=1 pid=3946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.809395 kernel: audit: type=1327 audit(1747305586.796:1139): proctitle=737368643A20636F7265205B707269765D May 15 10:39:46.796000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:46.811132 kernel: audit: type=1105 audit(1747305586.807:1140): pid=3946 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.807000 audit[3946]: USER_START pid=3946 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.809000 audit[3948]: CRED_ACQ pid=3948 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.820633 kernel: audit: type=1103 audit(1747305586.809:1141): pid=3948 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.922189 sshd[3946]: pam_unix(sshd:session): session closed for user core May 15 10:39:46.921000 audit[3946]: USER_END pid=3946 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.925023 systemd[1]: sshd@19-10.0.0.44:22-10.0.0.1:51964.service: Deactivated successfully. May 15 10:39:46.925728 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:39:46.922000 audit[3946]: CRED_DISP pid=3946 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.928000 systemd-logind[1192]: Session 20 logged out. Waiting for processes to exit. May 15 10:39:46.931569 kernel: audit: type=1106 audit(1747305586.921:1142): pid=3946 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.931761 kernel: audit: type=1104 audit(1747305586.922:1143): pid=3946 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.44:22-10.0.0.1:51964 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:46.932348 systemd-logind[1192]: Removed session 20. May 15 10:39:47.375354 env[1202]: time="2025-05-15T10:39:47.375284136Z" level=info msg="StopPodSandbox for \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\"" May 15 10:39:47.375790 env[1202]: time="2025-05-15T10:39:47.375394656Z" level=info msg="Container to stop \"3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:39:47.375790 env[1202]: time="2025-05-15T10:39:47.375418201Z" level=info msg="Container to stop \"f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:39:47.375790 env[1202]: time="2025-05-15T10:39:47.375435785Z" level=info msg="Container to stop \"d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" May 15 10:39:47.377807 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd-shm.mount: Deactivated successfully. May 15 10:39:47.403247 systemd[1]: cri-containerd-344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd.scope: Deactivated successfully. May 15 10:39:47.402000 audit: BPF prog-id=122 op=UNLOAD May 15 10:39:47.408000 audit: BPF prog-id=125 op=UNLOAD May 15 10:39:47.429168 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd-rootfs.mount: Deactivated successfully. May 15 10:39:47.440007 env[1202]: time="2025-05-15T10:39:47.439935779Z" level=info msg="shim disconnected" id=344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd May 15 10:39:47.440007 env[1202]: time="2025-05-15T10:39:47.440005251Z" level=warning msg="cleaning up after shim disconnected" id=344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd namespace=k8s.io May 15 10:39:47.440007 env[1202]: time="2025-05-15T10:39:47.440016523Z" level=info msg="cleaning up dead shim" May 15 10:39:47.447568 env[1202]: time="2025-05-15T10:39:47.447511022Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3977 runtime=io.containerd.runc.v2\n" May 15 10:39:47.448132 env[1202]: time="2025-05-15T10:39:47.448103260Z" level=info msg="TearDown network for sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" successfully" May 15 10:39:47.448260 env[1202]: time="2025-05-15T10:39:47.448237888Z" level=info msg="StopPodSandbox for \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" returns successfully" May 15 10:39:47.498902 kubelet[2038]: I0515 10:39:47.498828 2038 topology_manager.go:215] "Topology Admit Handler" podUID="3a13d0c4-9d41-4f7f-9528-693331bdd06e" podNamespace="calico-system" podName="calico-node-vzdnh" May 15 10:39:47.499450 kubelet[2038]: E0515 10:39:47.498928 2038 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" containerName="flexvol-driver" May 15 10:39:47.499450 kubelet[2038]: E0515 10:39:47.498945 2038 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" containerName="calico-node" May 15 10:39:47.499450 kubelet[2038]: E0515 10:39:47.498955 2038 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" containerName="calico-node" May 15 10:39:47.499450 kubelet[2038]: E0515 10:39:47.498976 2038 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" containerName="install-cni" May 15 10:39:47.499450 kubelet[2038]: I0515 10:39:47.499021 2038 memory_manager.go:354] "RemoveStaleState removing state" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" containerName="calico-node" May 15 10:39:47.499450 kubelet[2038]: I0515 10:39:47.499034 2038 memory_manager.go:354] "RemoveStaleState removing state" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" containerName="calico-node" May 15 10:39:47.499450 kubelet[2038]: E0515 10:39:47.499070 2038 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" containerName="calico-node" May 15 10:39:47.499450 kubelet[2038]: I0515 10:39:47.499125 2038 memory_manager.go:354] "RemoveStaleState removing state" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" containerName="calico-node" May 15 10:39:47.502910 kubelet[2038]: I0515 10:39:47.502867 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-net-dir\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.502910 kubelet[2038]: I0515 10:39:47.502914 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-var-lib-calico\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503210 kubelet[2038]: I0515 10:39:47.502941 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-tigera-ca-bundle\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503210 kubelet[2038]: I0515 10:39:47.502984 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-node-certs\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503210 kubelet[2038]: I0515 10:39:47.503005 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-bin-dir\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503210 kubelet[2038]: I0515 10:39:47.503025 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-policysync\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503210 kubelet[2038]: I0515 10:39:47.503050 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-flexvol-driver-host\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503210 kubelet[2038]: I0515 10:39:47.503069 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-log-dir\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503466 kubelet[2038]: I0515 10:39:47.503087 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-lib-modules\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503466 kubelet[2038]: I0515 10:39:47.503125 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"kube-api-access-wtlzd\" (UniqueName: \"kubernetes.io/projected/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-kube-api-access-wtlzd\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503466 kubelet[2038]: I0515 10:39:47.503143 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-var-run-calico\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503466 kubelet[2038]: I0515 10:39:47.503164 2038 reconciler_common.go:161] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-xtables-lock\") pod \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\" (UID: \"91c49c6b-c8f2-4e34-9258-1d7f99a2b855\") " May 15 10:39:47.503466 kubelet[2038]: I0515 10:39:47.503250 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.503656 kubelet[2038]: I0515 10:39:47.503291 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.503656 kubelet[2038]: I0515 10:39:47.503309 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.503656 kubelet[2038]: I0515 10:39:47.503559 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.503999 kubelet[2038]: I0515 10:39:47.503827 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.503999 kubelet[2038]: I0515 10:39:47.503860 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.503999 kubelet[2038]: I0515 10:39:47.503855 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.503999 kubelet[2038]: I0515 10:39:47.503925 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-policysync" (OuterVolumeSpecName: "policysync") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.503999 kubelet[2038]: I0515 10:39:47.503952 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" May 15 10:39:47.507563 systemd[1]: Created slice kubepods-besteffort-pod3a13d0c4_9d41_4f7f_9528_693331bdd06e.slice. May 15 10:39:47.510046 systemd[1]: var-lib-kubelet-pods-91c49c6b\x2dc8f2\x2d4e34\x2d9258\x2d1d7f99a2b855-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dwtlzd.mount: Deactivated successfully. May 15 10:39:47.510162 systemd[1]: var-lib-kubelet-pods-91c49c6b\x2dc8f2\x2d4e34\x2d9258\x2d1d7f99a2b855-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. May 15 10:39:47.514282 kubelet[2038]: I0515 10:39:47.514224 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-node-certs" (OuterVolumeSpecName: "node-certs") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" May 15 10:39:47.518973 kubelet[2038]: I0515 10:39:47.517312 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-kube-api-access-wtlzd" (OuterVolumeSpecName: "kube-api-access-wtlzd") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "kube-api-access-wtlzd". PluginName "kubernetes.io/projected", VolumeGidValue "" May 15 10:39:47.517839 systemd[1]: var-lib-kubelet-pods-91c49c6b\x2dc8f2\x2d4e34\x2d9258\x2d1d7f99a2b855-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. May 15 10:39:47.519953 kubelet[2038]: I0515 10:39:47.519916 2038 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "91c49c6b-c8f2-4e34-9258-1d7f99a2b855" (UID: "91c49c6b-c8f2-4e34-9258-1d7f99a2b855"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" May 15 10:39:47.604002 kubelet[2038]: I0515 10:39:47.603905 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-lib-modules\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604002 kubelet[2038]: I0515 10:39:47.603953 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-var-run-calico\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604002 kubelet[2038]: I0515 10:39:47.603981 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-var-lib-calico\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604002 kubelet[2038]: I0515 10:39:47.603997 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-cni-net-dir\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604002 kubelet[2038]: I0515 10:39:47.604011 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-cni-log-dir\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604395 kubelet[2038]: I0515 10:39:47.604026 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-flexvol-driver-host\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604395 kubelet[2038]: I0515 10:39:47.604041 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-78hr7\" (UniqueName: \"kubernetes.io/projected/3a13d0c4-9d41-4f7f-9528-693331bdd06e-kube-api-access-78hr7\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604395 kubelet[2038]: I0515 10:39:47.604058 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-xtables-lock\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604395 kubelet[2038]: I0515 10:39:47.604076 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3a13d0c4-9d41-4f7f-9528-693331bdd06e-tigera-ca-bundle\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604395 kubelet[2038]: I0515 10:39:47.604124 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3a13d0c4-9d41-4f7f-9528-693331bdd06e-node-certs\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604568 kubelet[2038]: I0515 10:39:47.604261 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-policysync\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604568 kubelet[2038]: I0515 10:39:47.604321 2038 reconciler_common.go:247] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3a13d0c4-9d41-4f7f-9528-693331bdd06e-cni-bin-dir\") pod \"calico-node-vzdnh\" (UID: \"3a13d0c4-9d41-4f7f-9528-693331bdd06e\") " pod="calico-system/calico-node-vzdnh" May 15 10:39:47.604568 kubelet[2038]: I0515 10:39:47.604376 2038 reconciler_common.go:289] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-xtables-lock\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604568 kubelet[2038]: I0515 10:39:47.604389 2038 reconciler_common.go:289] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-net-dir\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604568 kubelet[2038]: I0515 10:39:47.604401 2038 reconciler_common.go:289] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-node-certs\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604568 kubelet[2038]: I0515 10:39:47.604485 2038 reconciler_common.go:289] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604568 kubelet[2038]: I0515 10:39:47.604524 2038 reconciler_common.go:289] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-policysync\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604801 kubelet[2038]: I0515 10:39:47.604537 2038 reconciler_common.go:289] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-var-run-calico\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604801 kubelet[2038]: I0515 10:39:47.604549 2038 reconciler_common.go:289] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604801 kubelet[2038]: I0515 10:39:47.604562 2038 reconciler_common.go:289] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-cni-log-dir\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604801 kubelet[2038]: I0515 10:39:47.604576 2038 reconciler_common.go:289] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-var-lib-calico\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604801 kubelet[2038]: I0515 10:39:47.604592 2038 reconciler_common.go:289] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604801 kubelet[2038]: I0515 10:39:47.604605 2038 reconciler_common.go:289] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-lib-modules\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.604801 kubelet[2038]: I0515 10:39:47.604616 2038 reconciler_common.go:289] "Volume detached for volume \"kube-api-access-wtlzd\" (UniqueName: \"kubernetes.io/projected/91c49c6b-c8f2-4e34-9258-1d7f99a2b855-kube-api-access-wtlzd\") on node \"localhost\" DevicePath \"\"" May 15 10:39:47.815448 kubelet[2038]: E0515 10:39:47.815375 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.815921 env[1202]: time="2025-05-15T10:39:47.815861469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vzdnh,Uid:3a13d0c4-9d41-4f7f-9528-693331bdd06e,Namespace:calico-system,Attempt:0,}" May 15 10:39:47.828837 env[1202]: time="2025-05-15T10:39:47.828565972Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:47.828837 env[1202]: time="2025-05-15T10:39:47.828605898Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:47.828837 env[1202]: time="2025-05-15T10:39:47.828621096Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:47.828837 env[1202]: time="2025-05-15T10:39:47.828759871Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3 pid=4002 runtime=io.containerd.runc.v2 May 15 10:39:47.839213 systemd[1]: Started cri-containerd-38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3.scope. May 15 10:39:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit: BPF prog-id=145 op=LOAD May 15 10:39:47.852000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4002 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633962636337616238356530643261346665336436303863393130 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4002 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633962636337616238356530643261346665336436303863393130 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.852000 audit: BPF prog-id=146 op=LOAD May 15 10:39:47.852000 audit[4011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c5ce0 items=0 ppid=4002 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633962636337616238356530643261346665336436303863393130 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit: BPF prog-id=147 op=LOAD May 15 10:39:47.853000 audit[4011]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c5d28 items=0 ppid=4002 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633962636337616238356530643261346665336436303863393130 May 15 10:39:47.853000 audit: BPF prog-id=147 op=UNLOAD May 15 10:39:47.853000 audit: BPF prog-id=146 op=UNLOAD May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { perfmon } for pid=4011 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit[4011]: AVC avc: denied { bpf } for pid=4011 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.853000 audit: BPF prog-id=148 op=LOAD May 15 10:39:47.853000 audit[4011]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ae138 items=0 ppid=4002 pid=4011 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3338633962636337616238356530643261346665336436303863393130 May 15 10:39:47.865889 env[1202]: time="2025-05-15T10:39:47.865831301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vzdnh,Uid:3a13d0c4-9d41-4f7f-9528-693331bdd06e,Namespace:calico-system,Attempt:0,} returns sandbox id \"38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3\"" May 15 10:39:47.866671 kubelet[2038]: E0515 10:39:47.866634 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:47.868617 env[1202]: time="2025-05-15T10:39:47.868581554Z" level=info msg="CreateContainer within sandbox \"38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:39:47.882142 env[1202]: time="2025-05-15T10:39:47.882075371Z" level=info msg="CreateContainer within sandbox \"38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"43b9cb959b2dc4fc564b22587f7f77416afad708a7b175bf5490165271733c96\"" May 15 10:39:47.882874 env[1202]: time="2025-05-15T10:39:47.882828156Z" level=info msg="StartContainer for \"43b9cb959b2dc4fc564b22587f7f77416afad708a7b175bf5490165271733c96\"" May 15 10:39:47.898481 systemd[1]: Started cri-containerd-43b9cb959b2dc4fc564b22587f7f77416afad708a7b175bf5490165271733c96.scope. May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fba55f37e18 items=0 ppid=4002 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623963623935396232646334666335363462323235383766376637 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit: BPF prog-id=149 op=LOAD May 15 10:39:47.912000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000093018 items=0 ppid=4002 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623963623935396232646334666335363462323235383766376637 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit: BPF prog-id=150 op=LOAD May 15 10:39:47.912000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000093068 items=0 ppid=4002 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623963623935396232646334666335363462323235383766376637 May 15 10:39:47.912000 audit: BPF prog-id=150 op=UNLOAD May 15 10:39:47.912000 audit: BPF prog-id=149 op=UNLOAD May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:47.912000 audit: BPF prog-id=151 op=LOAD May 15 10:39:47.912000 audit[4044]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000930f8 items=0 ppid=4002 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:47.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433623963623935396232646334666335363462323235383766376637 May 15 10:39:47.962199 env[1202]: time="2025-05-15T10:39:47.962139920Z" level=info msg="StartContainer for \"43b9cb959b2dc4fc564b22587f7f77416afad708a7b175bf5490165271733c96\" returns successfully" May 15 10:39:47.971668 env[1202]: time="2025-05-15T10:39:47.971605887Z" level=info msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" May 15 10:39:47.982449 systemd[1]: cri-containerd-43b9cb959b2dc4fc564b22587f7f77416afad708a7b175bf5490165271733c96.scope: Deactivated successfully. May 15 10:39:47.986000 audit: BPF prog-id=151 op=UNLOAD May 15 10:39:48.027945 env[1202]: time="2025-05-15T10:39:48.027860440Z" level=info msg="shim disconnected" id=43b9cb959b2dc4fc564b22587f7f77416afad708a7b175bf5490165271733c96 May 15 10:39:48.027945 env[1202]: time="2025-05-15T10:39:48.027938909Z" level=warning msg="cleaning up after shim disconnected" id=43b9cb959b2dc4fc564b22587f7f77416afad708a7b175bf5490165271733c96 namespace=k8s.io May 15 10:39:48.027945 env[1202]: time="2025-05-15T10:39:48.027951764Z" level=info msg="cleaning up dead shim" May 15 10:39:48.031559 env[1202]: time="2025-05-15T10:39:48.031490167Z" level=error msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" failed" error="failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:48.031804 kubelet[2038]: E0515 10:39:48.031756 2038 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:48.031918 kubelet[2038]: E0515 10:39:48.031825 2038 kuberuntime_manager.go:1375] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd"} May 15 10:39:48.031918 kubelet[2038]: E0515 10:39:48.031877 2038 kuberuntime_manager.go:1075] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:48.032048 kubelet[2038]: E0515 10:39:48.031907 2038 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"af843951-e0be-4fdf-bf7c-7b61c7a66c0c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" podUID="af843951-e0be-4fdf-bf7c-7b61c7a66c0c" May 15 10:39:48.035301 env[1202]: time="2025-05-15T10:39:48.035250813Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4107 runtime=io.containerd.runc.v2\n" May 15 10:39:48.260609 kubelet[2038]: I0515 10:39:48.260570 2038 scope.go:117] "RemoveContainer" containerID="d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24" May 15 10:39:48.262447 env[1202]: time="2025-05-15T10:39:48.262356837Z" level=info msg="RemoveContainer for \"d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24\"" May 15 10:39:48.263919 kubelet[2038]: E0515 10:39:48.263849 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:48.265657 systemd[1]: Removed slice kubepods-besteffort-pod91c49c6b_c8f2_4e34_9258_1d7f99a2b855.slice. May 15 10:39:48.267472 env[1202]: time="2025-05-15T10:39:48.267423583Z" level=info msg="CreateContainer within sandbox \"38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:39:48.289831 env[1202]: time="2025-05-15T10:39:48.289787574Z" level=info msg="RemoveContainer for \"d1980e2d1f02e2bb7c43bee20ef8468ccfa0a7ef17c27a34a800c9cfb8c5cd24\" returns successfully" May 15 10:39:48.290461 kubelet[2038]: I0515 10:39:48.290254 2038 scope.go:117] "RemoveContainer" containerID="f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002" May 15 10:39:48.292939 env[1202]: time="2025-05-15T10:39:48.292911778Z" level=info msg="RemoveContainer for \"f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002\"" May 15 10:39:48.301535 env[1202]: time="2025-05-15T10:39:48.301487131Z" level=info msg="RemoveContainer for \"f26626fb4e943ca1ea8bacb096e3a361f32e8308e7d4c33ad91f870d48a17002\" returns successfully" May 15 10:39:48.304847 kubelet[2038]: I0515 10:39:48.304079 2038 scope.go:117] "RemoveContainer" containerID="3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc" May 15 10:39:48.307301 env[1202]: time="2025-05-15T10:39:48.307260203Z" level=info msg="RemoveContainer for \"3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc\"" May 15 10:39:48.309335 env[1202]: time="2025-05-15T10:39:48.309035155Z" level=info msg="CreateContainer within sandbox \"38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"ecfab54354614507228b3dfc5909915fd555ef369f08f99bba1271fe8c03d438\"" May 15 10:39:48.309982 env[1202]: time="2025-05-15T10:39:48.309945982Z" level=info msg="StartContainer for \"ecfab54354614507228b3dfc5909915fd555ef369f08f99bba1271fe8c03d438\"" May 15 10:39:48.312217 env[1202]: time="2025-05-15T10:39:48.312171934Z" level=info msg="RemoveContainer for \"3573dd0af35396dfefabe3181a35f6a7c4d75cd3be9e4f1406844a11ca052ccc\" returns successfully" May 15 10:39:48.326322 systemd[1]: Started cri-containerd-ecfab54354614507228b3dfc5909915fd555ef369f08f99bba1271fe8c03d438.scope. May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f347c1f63f8 items=0 ppid=4002 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:48.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563666162353433353436313435303732323862336466633539303939 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit: BPF prog-id=152 op=LOAD May 15 10:39:48.339000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000269ba8 items=0 ppid=4002 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:48.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563666162353433353436313435303732323862336466633539303939 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit: BPF prog-id=153 op=LOAD May 15 10:39:48.339000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000269bf8 items=0 ppid=4002 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:48.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563666162353433353436313435303732323862336466633539303939 May 15 10:39:48.339000 audit: BPF prog-id=153 op=UNLOAD May 15 10:39:48.339000 audit: BPF prog-id=152 op=UNLOAD May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { perfmon } for pid=4132 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit[4132]: AVC avc: denied { bpf } for pid=4132 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:48.339000 audit: BPF prog-id=154 op=LOAD May 15 10:39:48.339000 audit[4132]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000269c88 items=0 ppid=4002 pid=4132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:48.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563666162353433353436313435303732323862336466633539303939 May 15 10:39:48.353611 env[1202]: time="2025-05-15T10:39:48.353539822Z" level=info msg="StartContainer for \"ecfab54354614507228b3dfc5909915fd555ef369f08f99bba1271fe8c03d438\" returns successfully" May 15 10:39:48.759231 systemd[1]: cri-containerd-ecfab54354614507228b3dfc5909915fd555ef369f08f99bba1271fe8c03d438.scope: Deactivated successfully. May 15 10:39:48.764000 audit: BPF prog-id=154 op=UNLOAD May 15 10:39:48.777378 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-ecfab54354614507228b3dfc5909915fd555ef369f08f99bba1271fe8c03d438-rootfs.mount: Deactivated successfully. May 15 10:39:48.782781 env[1202]: time="2025-05-15T10:39:48.782442524Z" level=info msg="shim disconnected" id=ecfab54354614507228b3dfc5909915fd555ef369f08f99bba1271fe8c03d438 May 15 10:39:48.782781 env[1202]: time="2025-05-15T10:39:48.782489363Z" level=warning msg="cleaning up after shim disconnected" id=ecfab54354614507228b3dfc5909915fd555ef369f08f99bba1271fe8c03d438 namespace=k8s.io May 15 10:39:48.782781 env[1202]: time="2025-05-15T10:39:48.782500104Z" level=info msg="cleaning up dead shim" May 15 10:39:48.788937 env[1202]: time="2025-05-15T10:39:48.788884281Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=4173 runtime=io.containerd.runc.v2\n" May 15 10:39:48.973225 kubelet[2038]: I0515 10:39:48.973171 2038 kubelet_volumes.go:163] "Cleaned up orphaned pod volumes dir" podUID="91c49c6b-c8f2-4e34-9258-1d7f99a2b855" path="/var/lib/kubelet/pods/91c49c6b-c8f2-4e34-9258-1d7f99a2b855/volumes" May 15 10:39:49.271662 kubelet[2038]: E0515 10:39:49.270503 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:49.286853 env[1202]: time="2025-05-15T10:39:49.286798744Z" level=info msg="CreateContainer within sandbox \"38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:39:49.303147 env[1202]: time="2025-05-15T10:39:49.303071655Z" level=info msg="CreateContainer within sandbox \"38c9bcc7ab85e0d2a4fe3d608c91050b77d9a2265ce73710dc7a188327f7eab3\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"402be5ad8866e633af17fd0bef181cdfb7daa6f26117f24a0bb458069d19bc02\"" May 15 10:39:49.303785 env[1202]: time="2025-05-15T10:39:49.303757000Z" level=info msg="StartContainer for \"402be5ad8866e633af17fd0bef181cdfb7daa6f26117f24a0bb458069d19bc02\"" May 15 10:39:49.318493 systemd[1]: Started cri-containerd-402be5ad8866e633af17fd0bef181cdfb7daa6f26117f24a0bb458069d19bc02.scope. May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fbe3575ef78 items=0 ppid=4002 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326265356164383836366536333361663137666430626566313831 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit: BPF prog-id=155 op=LOAD May 15 10:39:49.337000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002dc0f8 items=0 ppid=4002 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326265356164383836366536333361663137666430626566313831 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit: BPF prog-id=156 op=LOAD May 15 10:39:49.337000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002dc148 items=0 ppid=4002 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326265356164383836366536333361663137666430626566313831 May 15 10:39:49.337000 audit: BPF prog-id=156 op=UNLOAD May 15 10:39:49.337000 audit: BPF prog-id=155 op=UNLOAD May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { perfmon } for pid=4194 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit[4194]: AVC avc: denied { bpf } for pid=4194 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:49.337000 audit: BPF prog-id=157 op=LOAD May 15 10:39:49.337000 audit[4194]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002dc1d8 items=0 ppid=4002 pid=4194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:49.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430326265356164383836366536333361663137666430626566313831 May 15 10:39:49.351877 env[1202]: time="2025-05-15T10:39:49.351819048Z" level=info msg="StartContainer for \"402be5ad8866e633af17fd0bef181cdfb7daa6f26117f24a0bb458069d19bc02\" returns successfully" May 15 10:39:50.275692 kubelet[2038]: E0515 10:39:50.275655 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:50.633000 audit[4310]: AVC avc: denied { write } for pid=4310 comm="tee" name="fd" dev="proc" ino=27233 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.633000 audit[4310]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff0f6eda2c a2=241 a3=1b6 items=1 ppid=4286 pid=4310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.633000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:39:50.633000 audit: PATH item=0 name="/dev/fd/63" inode=28243 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.633000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.656000 audit[4342]: AVC avc: denied { write } for pid=4342 comm="tee" name="fd" dev="proc" ino=27244 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.656000 audit[4342]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff34598a2a a2=241 a3=1b6 items=1 ppid=4279 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.656000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:39:50.656000 audit: PATH item=0 name="/dev/fd/63" inode=27230 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.656000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.658000 audit[4348]: AVC avc: denied { write } for pid=4348 comm="tee" name="fd" dev="proc" ino=27248 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.658000 audit[4348]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca95f1a2b a2=241 a3=1b6 items=1 ppid=4283 pid=4348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.658000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:39:50.658000 audit: PATH item=0 name="/dev/fd/63" inode=26328 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.658000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.659000 audit[4352]: AVC avc: denied { write } for pid=4352 comm="tee" name="fd" dev="proc" ino=27252 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.659000 audit[4352]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee91e5a2a a2=241 a3=1b6 items=1 ppid=4278 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.659000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:39:50.659000 audit: PATH item=0 name="/dev/fd/63" inode=26332 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.659000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.662000 audit[4343]: AVC avc: denied { write } for pid=4343 comm="tee" name="fd" dev="proc" ino=28263 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.663000 audit[4335]: AVC avc: denied { write } for pid=4335 comm="tee" name="fd" dev="proc" ino=28264 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.662000 audit[4343]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff76f55a1a a2=241 a3=1b6 items=1 ppid=4293 pid=4343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.662000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:39:50.662000 audit: PATH item=0 name="/dev/fd/63" inode=28256 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.662000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.663000 audit[4335]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcd4049a2a a2=241 a3=1b6 items=1 ppid=4281 pid=4335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.663000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:39:50.663000 audit: PATH item=0 name="/dev/fd/63" inode=27228 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.663000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.668000 audit[4354]: AVC avc: denied { write } for pid=4354 comm="tee" name="fd" dev="proc" ino=25492 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:50.668000 audit[4354]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff5c40fa1b a2=241 a3=1b6 items=1 ppid=4288 pid=4354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.668000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:39:50.668000 audit: PATH item=0 name="/dev/fd/63" inode=27239 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:50.668000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit: BPF prog-id=158 op=LOAD May 15 10:39:50.769000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc09a1ce80 a2=98 a3=3 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.769000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.769000 audit: BPF prog-id=158 op=UNLOAD May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit: BPF prog-id=159 op=LOAD May 15 10:39:50.769000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc09a1cc60 a2=74 a3=540051 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.769000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.769000 audit: BPF prog-id=159 op=UNLOAD May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.769000 audit: BPF prog-id=160 op=LOAD May 15 10:39:50.769000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc09a1cc90 a2=94 a3=2 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.769000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.769000 audit: BPF prog-id=160 op=UNLOAD May 15 10:39:50.879000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit: BPF prog-id=161 op=LOAD May 15 10:39:50.879000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc09a1cb50 a2=40 a3=1 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.879000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.879000 audit: BPF prog-id=161 op=UNLOAD May 15 10:39:50.879000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.879000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc09a1cc20 a2=50 a3=7ffc09a1cd00 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.879000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc09a1cb60 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc09a1cb90 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc09a1caa0 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc09a1cbb0 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc09a1cb90 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc09a1cb80 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc09a1cbb0 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc09a1cb90 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc09a1cbb0 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc09a1cb80 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc09a1cbf0 a2=28 a3=0 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc09a1c9a0 a2=50 a3=1 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit: BPF prog-id=162 op=LOAD May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc09a1c9a0 a2=94 a3=5 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit: BPF prog-id=162 op=UNLOAD May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc09a1ca50 a2=50 a3=1 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc09a1cb70 a2=4 a3=38 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.887000 audit[4398]: AVC avc: denied { confidentiality } for pid=4398 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:50.887000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc09a1cbc0 a2=94 a3=6 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.887000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.888000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { confidentiality } for pid=4398 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:50.888000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc09a1c370 a2=94 a3=83 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.888000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.888000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { perfmon } for pid=4398 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { bpf } for pid=4398 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.888000 audit[4398]: AVC avc: denied { confidentiality } for pid=4398 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:50.888000 audit[4398]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc09a1c370 a2=94 a3=83 items=0 ppid=4282 pid=4398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.888000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:50.896000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit: BPF prog-id=163 op=LOAD May 15 10:39:50.896000 audit[4401]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe22fbb380 a2=98 a3=1999999999999999 items=0 ppid=4282 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.896000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:50.896000 audit: BPF prog-id=163 op=UNLOAD May 15 10:39:50.896000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.896000 audit: BPF prog-id=164 op=LOAD May 15 10:39:50.896000 audit[4401]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe22fbb260 a2=74 a3=ffff items=0 ppid=4282 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.896000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:50.897000 audit: BPF prog-id=164 op=UNLOAD May 15 10:39:50.897000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit[4401]: AVC avc: denied { perfmon } for pid=4401 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit[4401]: AVC avc: denied { bpf } for pid=4401 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.897000 audit: BPF prog-id=165 op=LOAD May 15 10:39:50.897000 audit[4401]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe22fbb2a0 a2=40 a3=7ffe22fbb480 items=0 ppid=4282 pid=4401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.897000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:50.897000 audit: BPF prog-id=165 op=UNLOAD May 15 10:39:50.946596 systemd-networkd[1035]: vxlan.calico: Link UP May 15 10:39:50.946608 systemd-networkd[1035]: vxlan.calico: Gained carrier May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit: BPF prog-id=166 op=LOAD May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3739f4c0 a2=98 a3=ffffffff items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit: BPF prog-id=166 op=UNLOAD May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit: BPF prog-id=167 op=LOAD May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3739f2d0 a2=74 a3=540051 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit: BPF prog-id=167 op=UNLOAD May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit: BPF prog-id=168 op=LOAD May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe3739f300 a2=94 a3=2 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit: BPF prog-id=168 op=UNLOAD May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3739f1d0 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3739f200 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3739f110 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3739f220 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3739f200 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3739f1f0 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3739f220 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3739f200 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3739f220 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe3739f1f0 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe3739f260 a2=28 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.968000 audit: BPF prog-id=169 op=LOAD May 15 10:39:50.968000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe3739f0d0 a2=40 a3=0 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.968000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.968000 audit: BPF prog-id=169 op=UNLOAD May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe3739f0c0 a2=50 a3=2800 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.969000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe3739f0c0 a2=50 a3=2800 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.969000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit: BPF prog-id=170 op=LOAD May 15 10:39:50.969000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe3739e8e0 a2=94 a3=2 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.969000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.969000 audit: BPF prog-id=170 op=UNLOAD May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.969000 audit: BPF prog-id=171 op=LOAD May 15 10:39:50.969000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe3739e9e0 a2=94 a3=30 items=0 ppid=4282 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.969000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.973000 audit: BPF prog-id=172 op=LOAD May 15 10:39:50.973000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffef374eda0 a2=98 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.973000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:50.974000 audit: BPF prog-id=172 op=UNLOAD May 15 10:39:50.974000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit: BPF prog-id=173 op=LOAD May 15 10:39:50.974000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef374eb80 a2=74 a3=540051 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:50.974000 audit: BPF prog-id=173 op=UNLOAD May 15 10:39:50.974000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:50.974000 audit: BPF prog-id=174 op=LOAD May 15 10:39:50.974000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef374ebb0 a2=94 a3=2 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:50.974000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:50.974000 audit: BPF prog-id=174 op=UNLOAD May 15 10:39:51.089000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit: BPF prog-id=175 op=LOAD May 15 10:39:51.089000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffef374ea70 a2=40 a3=1 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.089000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.089000 audit: BPF prog-id=175 op=UNLOAD May 15 10:39:51.089000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.089000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffef374eb40 a2=50 a3=7ffef374ec20 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.089000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef374ea80 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef374eab0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef374e9c0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef374ead0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef374eab0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef374eaa0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef374ead0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef374eab0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef374ead0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffef374eaa0 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffef374eb10 a2=28 a3=0 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef374e8c0 a2=50 a3=1 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit: BPF prog-id=176 op=LOAD May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffef374e8c0 a2=94 a3=5 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit: BPF prog-id=176 op=UNLOAD May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffef374e970 a2=50 a3=1 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffef374ea90 a2=4 a3=38 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { confidentiality } for pid=4434 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef374eae0 a2=94 a3=6 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { confidentiality } for pid=4434 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef374e290 a2=94 a3=83 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { perfmon } for pid=4434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.098000 audit[4434]: AVC avc: denied { confidentiality } for pid=4434 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:51.098000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffef374e290 a2=94 a3=83 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.098000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.099000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.099000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffef374fcd0 a2=10 a3=208 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.099000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.099000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffef374fb70 a2=10 a3=3 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.099000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.099000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffef374fb10 a2=10 a3=3 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.099000 audit[4434]: AVC avc: denied { bpf } for pid=4434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:51.099000 audit[4434]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffef374fb10 a2=10 a3=7 items=0 ppid=4282 pid=4434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.099000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:51.106000 audit: BPF prog-id=171 op=UNLOAD May 15 10:39:51.147000 audit[4464]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=4464 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:51.147000 audit[4464]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffdf1aee070 a2=0 a3=7ffdf1aee05c items=0 ppid=4282 pid=4464 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.147000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:51.150000 audit[4463]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=4463 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:51.150000 audit[4463]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffc8351110 a2=0 a3=7fffc83510fc items=0 ppid=4282 pid=4463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.150000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:51.156000 audit[4462]: NETFILTER_CFG table=raw:99 family=2 entries=21 op=nft_register_chain pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:51.156000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7fffdaba7a50 a2=0 a3=7fffdaba7a3c items=0 ppid=4282 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.156000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:51.157000 audit[4467]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=4467 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:51.157000 audit[4467]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fff6a2e1e90 a2=0 a3=7fff6a2e1e7c items=0 ppid=4282 pid=4467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.157000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:51.277436 kubelet[2038]: E0515 10:39:51.277336 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:51.927429 systemd[1]: Started sshd@20-10.0.0.44:22-10.0.0.1:36032.service. May 15 10:39:51.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.44:22-10.0.0.1:36032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:51.928723 kernel: kauditd_printk_skb: 706 callbacks suppressed May 15 10:39:51.928782 kernel: audit: type=1130 audit(1747305591.927:1287): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.44:22-10.0.0.1:36032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:51.970000 audit[4496]: USER_ACCT pid=4496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.971235 sshd[4496]: Accepted publickey for core from 10.0.0.1 port 36032 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:51.973732 sshd[4496]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:51.972000 audit[4496]: CRED_ACQ pid=4496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.976053 env[1202]: time="2025-05-15T10:39:51.975829021Z" level=info msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" May 15 10:39:51.978809 kernel: audit: type=1101 audit(1747305591.970:1288): pid=4496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.978911 kernel: audit: type=1103 audit(1747305591.972:1289): pid=4496 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.981423 kernel: audit: type=1006 audit(1747305591.972:1290): pid=4496 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 May 15 10:39:51.980902 systemd[1]: Started session-21.scope. May 15 10:39:51.981474 systemd-logind[1192]: New session 21 of user core. May 15 10:39:51.985865 kernel: audit: type=1300 audit(1747305591.972:1290): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe087c0f20 a2=3 a3=0 items=0 ppid=1 pid=4496 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.972000 audit[4496]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe087c0f20 a2=3 a3=0 items=0 ppid=1 pid=4496 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.972000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:51.987351 kernel: audit: type=1327 audit(1747305591.972:1290): proctitle=737368643A20636F7265205B707269765D May 15 10:39:51.986000 audit[4496]: USER_START pid=4496 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.992292 kernel: audit: type=1105 audit(1747305591.986:1291): pid=4496 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.992398 kernel: audit: type=1103 audit(1747305591.988:1292): pid=4508 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.988000 audit[4508]: CRED_ACQ pid=4508 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:52.038720 kubelet[2038]: I0515 10:39:52.038576 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vzdnh" podStartSLOduration=5.038558292 podStartE2EDuration="5.038558292s" podCreationTimestamp="2025-05-15 10:39:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:50.297724893 +0000 UTC m=+85.410985566" watchObservedRunningTime="2025-05-15 10:39:52.038558292 +0000 UTC m=+87.151818935" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.038 [INFO][4516] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.039 [INFO][4516] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" iface="eth0" netns="/var/run/netns/cni-d11b7cb2-b957-0ce3-6bf5-bafaeb2311e6" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.039 [INFO][4516] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" iface="eth0" netns="/var/run/netns/cni-d11b7cb2-b957-0ce3-6bf5-bafaeb2311e6" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.041 [INFO][4516] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" iface="eth0" netns="/var/run/netns/cni-d11b7cb2-b957-0ce3-6bf5-bafaeb2311e6" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.041 [INFO][4516] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.041 [INFO][4516] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.070 [INFO][4532] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.070 [INFO][4532] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.070 [INFO][4532] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.075 [WARNING][4532] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.075 [INFO][4532] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.076 [INFO][4532] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:52.080130 env[1202]: 2025-05-15 10:39:52.078 [INFO][4516] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:39:52.080566 env[1202]: time="2025-05-15T10:39:52.080286904Z" level=info msg="TearDown network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" successfully" May 15 10:39:52.080566 env[1202]: time="2025-05-15T10:39:52.080317272Z" level=info msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" returns successfully" May 15 10:39:52.081314 kubelet[2038]: E0515 10:39:52.080826 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:52.081642 env[1202]: time="2025-05-15T10:39:52.081609161Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-km746,Uid:d599ad29-ab1c-4f94-a799-31f081a7cdec,Namespace:kube-system,Attempt:1,}" May 15 10:39:52.082350 systemd[1]: run-netns-cni\x2dd11b7cb2\x2db957\x2d0ce3\x2d6bf5\x2dbafaeb2311e6.mount: Deactivated successfully. May 15 10:39:52.118336 sshd[4496]: pam_unix(sshd:session): session closed for user core May 15 10:39:52.118000 audit[4496]: USER_END pid=4496 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:52.118000 audit[4496]: CRED_DISP pid=4496 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:52.120863 systemd-logind[1192]: Session 21 logged out. Waiting for processes to exit. May 15 10:39:52.121245 systemd[1]: sshd@20-10.0.0.44:22-10.0.0.1:36032.service: Deactivated successfully. May 15 10:39:52.122135 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:39:52.123569 systemd-logind[1192]: Removed session 21. May 15 10:39:52.127409 kernel: audit: type=1106 audit(1747305592.118:1293): pid=4496 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:52.127470 kernel: audit: type=1104 audit(1747305592.118:1294): pid=4496 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:52.120000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.44:22-10.0.0.1:36032 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:52.209190 systemd-networkd[1035]: calia0f3c152c0b: Link UP May 15 10:39:52.211064 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:52.211154 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia0f3c152c0b: link becomes ready May 15 10:39:52.211291 systemd-networkd[1035]: calia0f3c152c0b: Gained carrier May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.144 [INFO][4541] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--km746-eth0 coredns-7db6d8ff4d- kube-system d599ad29-ab1c-4f94-a799-31f081a7cdec 1087 0 2025-05-15 10:38:39 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-km746 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia0f3c152c0b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Namespace="kube-system" Pod="coredns-7db6d8ff4d-km746" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--km746-" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.144 [INFO][4541] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Namespace="kube-system" Pod="coredns-7db6d8ff4d-km746" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.169 [INFO][4556] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" HandleID="k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.177 [INFO][4556] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" HandleID="k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5b00), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-km746", "timestamp":"2025-05-15 10:39:52.16927819 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.177 [INFO][4556] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.177 [INFO][4556] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.177 [INFO][4556] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.179 [INFO][4556] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.186 [INFO][4556] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.190 [INFO][4556] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.192 [INFO][4556] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.194 [INFO][4556] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.194 [INFO][4556] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.195 [INFO][4556] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938 May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.200 [INFO][4556] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.204 [INFO][4556] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.204 [INFO][4556] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" host="localhost" May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.204 [INFO][4556] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:52.224713 env[1202]: 2025-05-15 10:39:52.204 [INFO][4556] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" HandleID="k8s-pod-network.410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.225320 env[1202]: 2025-05-15 10:39:52.207 [INFO][4541] cni-plugin/k8s.go 386: Populated endpoint ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Namespace="kube-system" Pod="coredns-7db6d8ff4d-km746" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--km746-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d599ad29-ab1c-4f94-a799-31f081a7cdec", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-km746", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0f3c152c0b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:52.225320 env[1202]: 2025-05-15 10:39:52.207 [INFO][4541] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Namespace="kube-system" Pod="coredns-7db6d8ff4d-km746" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.225320 env[1202]: 2025-05-15 10:39:52.207 [INFO][4541] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia0f3c152c0b ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Namespace="kube-system" Pod="coredns-7db6d8ff4d-km746" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.225320 env[1202]: 2025-05-15 10:39:52.211 [INFO][4541] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Namespace="kube-system" Pod="coredns-7db6d8ff4d-km746" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.225320 env[1202]: 2025-05-15 10:39:52.211 [INFO][4541] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Namespace="kube-system" Pod="coredns-7db6d8ff4d-km746" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--km746-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d599ad29-ab1c-4f94-a799-31f081a7cdec", ResourceVersion:"1087", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938", Pod:"coredns-7db6d8ff4d-km746", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0f3c152c0b", MAC:"26:3c:fc:d6:bb:de", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:52.225320 env[1202]: 2025-05-15 10:39:52.222 [INFO][4541] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938" Namespace="kube-system" Pod="coredns-7db6d8ff4d-km746" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:39:52.234000 audit[4578]: NETFILTER_CFG table=filter:101 family=2 entries=34 op=nft_register_chain pid=4578 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:52.234000 audit[4578]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffe80c4cb00 a2=0 a3=7ffe80c4caec items=0 ppid=4282 pid=4578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.234000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:52.239842 env[1202]: time="2025-05-15T10:39:52.239766548Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:52.239842 env[1202]: time="2025-05-15T10:39:52.239807285Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:52.239842 env[1202]: time="2025-05-15T10:39:52.239818176Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:52.240341 env[1202]: time="2025-05-15T10:39:52.240265237Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938 pid=4587 runtime=io.containerd.runc.v2 May 15 10:39:52.255026 systemd[1]: Started cri-containerd-410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938.scope. May 15 10:39:52.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.262000 audit: BPF prog-id=177 op=LOAD May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4587 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306466643765336430333136633362333664353933363063333930 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4587 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306466643765336430333136633362333664353933363063333930 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit: BPF prog-id=178 op=LOAD May 15 10:39:52.263000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000269ce0 items=0 ppid=4587 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306466643765336430333136633362333664353933363063333930 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit: BPF prog-id=179 op=LOAD May 15 10:39:52.263000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000269d28 items=0 ppid=4587 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306466643765336430333136633362333664353933363063333930 May 15 10:39:52.263000 audit: BPF prog-id=179 op=UNLOAD May 15 10:39:52.263000 audit: BPF prog-id=178 op=UNLOAD May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.263000 audit: BPF prog-id=180 op=LOAD May 15 10:39:52.263000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003e8138 items=0 ppid=4587 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.263000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431306466643765336430333136633362333664353933363063333930 May 15 10:39:52.265416 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:52.285232 env[1202]: time="2025-05-15T10:39:52.285181565Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-km746,Uid:d599ad29-ab1c-4f94-a799-31f081a7cdec,Namespace:kube-system,Attempt:1,} returns sandbox id \"410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938\"" May 15 10:39:52.285791 kubelet[2038]: E0515 10:39:52.285761 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:52.287651 env[1202]: time="2025-05-15T10:39:52.287560322Z" level=info msg="CreateContainer within sandbox \"410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:39:52.302169 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4008236911.mount: Deactivated successfully. May 15 10:39:52.303960 env[1202]: time="2025-05-15T10:39:52.303920462Z" level=info msg="CreateContainer within sandbox \"410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f8ab1dd34d0366e3e84faf42a191acb72d3becd9d934f41c1385173b6abe310d\"" May 15 10:39:52.304503 env[1202]: time="2025-05-15T10:39:52.304454879Z" level=info msg="StartContainer for \"f8ab1dd34d0366e3e84faf42a191acb72d3becd9d934f41c1385173b6abe310d\"" May 15 10:39:52.315791 systemd-networkd[1035]: vxlan.calico: Gained IPv6LL May 15 10:39:52.322700 systemd[1]: Started cri-containerd-f8ab1dd34d0366e3e84faf42a191acb72d3becd9d934f41c1385173b6abe310d.scope. May 15 10:39:52.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.342000 audit: BPF prog-id=181 op=LOAD May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4587 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638616231646433346430333636653365383466616634326131393161 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4587 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638616231646433346430333636653365383466616634326131393161 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit: BPF prog-id=182 op=LOAD May 15 10:39:52.343000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001efde0 items=0 ppid=4587 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638616231646433346430333636653365383466616634326131393161 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit: BPF prog-id=183 op=LOAD May 15 10:39:52.343000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001efe28 items=0 ppid=4587 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638616231646433346430333636653365383466616634326131393161 May 15 10:39:52.343000 audit: BPF prog-id=183 op=UNLOAD May 15 10:39:52.343000 audit: BPF prog-id=182 op=UNLOAD May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { perfmon } for pid=4627 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit[4627]: AVC avc: denied { bpf } for pid=4627 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:52.343000 audit: BPF prog-id=184 op=LOAD May 15 10:39:52.343000 audit[4627]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003b2238 items=0 ppid=4587 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:52.343000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6638616231646433346430333636653365383466616634326131393161 May 15 10:39:52.356447 env[1202]: time="2025-05-15T10:39:52.356407245Z" level=info msg="StartContainer for \"f8ab1dd34d0366e3e84faf42a191acb72d3becd9d934f41c1385173b6abe310d\" returns successfully" May 15 10:39:53.282342 kubelet[2038]: E0515 10:39:53.282282 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:53.292498 kubelet[2038]: I0515 10:39:53.292439 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-km746" podStartSLOduration=74.292419856 podStartE2EDuration="1m14.292419856s" podCreationTimestamp="2025-05-15 10:38:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:53.291836065 +0000 UTC m=+88.405096698" watchObservedRunningTime="2025-05-15 10:39:53.292419856 +0000 UTC m=+88.405680499" May 15 10:39:53.304000 audit[4661]: NETFILTER_CFG table=filter:102 family=2 entries=16 op=nft_register_rule pid=4661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.304000 audit[4661]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe5d47c2d0 a2=0 a3=7ffe5d47c2bc items=0 ppid=2237 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.304000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.319000 audit[4661]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=4661 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.319000 audit[4661]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe5d47c2d0 a2=0 a3=0 items=0 ppid=2237 pid=4661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.333000 audit[4663]: NETFILTER_CFG table=filter:104 family=2 entries=13 op=nft_register_rule pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.333000 audit[4663]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd51fb9030 a2=0 a3=7ffd51fb901c items=0 ppid=2237 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.333000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.338000 audit[4663]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=4663 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:53.338000 audit[4663]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd51fb9030 a2=0 a3=7ffd51fb901c items=0 ppid=2237 pid=4663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:53.338000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:53.464319 systemd-networkd[1035]: calia0f3c152c0b: Gained IPv6LL May 15 10:39:54.283560 kubelet[2038]: E0515 10:39:54.283514 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:54.972624 env[1202]: time="2025-05-15T10:39:54.972565896Z" level=info msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.013 [INFO][4680] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.014 [INFO][4680] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" iface="eth0" netns="/var/run/netns/cni-eca7612c-1f3f-3699-7c1f-1c1dbecf1ad5" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.014 [INFO][4680] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" iface="eth0" netns="/var/run/netns/cni-eca7612c-1f3f-3699-7c1f-1c1dbecf1ad5" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.014 [INFO][4680] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" iface="eth0" netns="/var/run/netns/cni-eca7612c-1f3f-3699-7c1f-1c1dbecf1ad5" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.014 [INFO][4680] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.014 [INFO][4680] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.032 [INFO][4688] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.032 [INFO][4688] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.032 [INFO][4688] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.037 [WARNING][4688] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.037 [INFO][4688] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.038 [INFO][4688] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:55.041177 env[1202]: 2025-05-15 10:39:55.039 [INFO][4680] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:39:55.042282 env[1202]: time="2025-05-15T10:39:55.042225788Z" level=info msg="TearDown network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" successfully" May 15 10:39:55.042333 env[1202]: time="2025-05-15T10:39:55.042279681Z" level=info msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" returns successfully" May 15 10:39:55.042595 kubelet[2038]: E0515 10:39:55.042565 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:55.043759 env[1202]: time="2025-05-15T10:39:55.043160555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-d5ptl,Uid:977383d6-9b09-4182-9d9f-aa8e054ab44e,Namespace:kube-system,Attempt:1,}" May 15 10:39:55.043769 systemd[1]: run-netns-cni\x2deca7612c\x2d1f3f\x2d3699\x2d7c1f\x2d1c1dbecf1ad5.mount: Deactivated successfully. May 15 10:39:55.139151 systemd-networkd[1035]: calid6111490877: Link UP May 15 10:39:55.141805 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:55.142258 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid6111490877: link becomes ready May 15 10:39:55.141868 systemd-networkd[1035]: calid6111490877: Gained carrier May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.083 [INFO][4695] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0 coredns-7db6d8ff4d- kube-system 977383d6-9b09-4182-9d9f-aa8e054ab44e 1116 0 2025-05-15 10:38:39 +0000 UTC map[k8s-app:kube-dns pod-template-hash:7db6d8ff4d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-7db6d8ff4d-d5ptl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calid6111490877 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-d5ptl" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--d5ptl-" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.083 [INFO][4695] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-d5ptl" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.108 [INFO][4712] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" HandleID="k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.115 [INFO][4712] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" HandleID="k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00011c7d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-7db6d8ff4d-d5ptl", "timestamp":"2025-05-15 10:39:55.108326306 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.115 [INFO][4712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.115 [INFO][4712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.115 [INFO][4712] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.116 [INFO][4712] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.119 [INFO][4712] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.123 [INFO][4712] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.124 [INFO][4712] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.126 [INFO][4712] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.126 [INFO][4712] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.128 [INFO][4712] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.131 [INFO][4712] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.135 [INFO][4712] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.135 [INFO][4712] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" host="localhost" May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.135 [INFO][4712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:55.153658 env[1202]: 2025-05-15 10:39:55.135 [INFO][4712] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" HandleID="k8s-pod-network.4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.154279 env[1202]: 2025-05-15 10:39:55.137 [INFO][4695] cni-plugin/k8s.go 386: Populated endpoint ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-d5ptl" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"977383d6-9b09-4182-9d9f-aa8e054ab44e", ResourceVersion:"1116", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-7db6d8ff4d-d5ptl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid6111490877", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:55.154279 env[1202]: 2025-05-15 10:39:55.137 [INFO][4695] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-d5ptl" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.154279 env[1202]: 2025-05-15 10:39:55.137 [INFO][4695] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid6111490877 ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-d5ptl" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.154279 env[1202]: 2025-05-15 10:39:55.142 [INFO][4695] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-d5ptl" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.154279 env[1202]: 2025-05-15 10:39:55.142 [INFO][4695] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-d5ptl" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"977383d6-9b09-4182-9d9f-aa8e054ab44e", ResourceVersion:"1116", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e", Pod:"coredns-7db6d8ff4d-d5ptl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid6111490877", MAC:"5e:e3:63:5b:3e:29", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:55.154279 env[1202]: 2025-05-15 10:39:55.150 [INFO][4695] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e" Namespace="kube-system" Pod="coredns-7db6d8ff4d-d5ptl" WorkloadEndpoint="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:39:55.158000 audit[4728]: NETFILTER_CFG table=filter:106 family=2 entries=30 op=nft_register_chain pid=4728 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:55.158000 audit[4728]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7fff2f121b80 a2=0 a3=7fff2f121b6c items=0 ppid=4282 pid=4728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.158000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:55.167337 env[1202]: time="2025-05-15T10:39:55.167263257Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:55.167337 env[1202]: time="2025-05-15T10:39:55.167301169Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:55.167337 env[1202]: time="2025-05-15T10:39:55.167315867Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:55.167531 env[1202]: time="2025-05-15T10:39:55.167467445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e pid=4741 runtime=io.containerd.runc.v2 May 15 10:39:55.179755 systemd[1]: Started cri-containerd-4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e.scope. May 15 10:39:55.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.189000 audit: BPF prog-id=185 op=LOAD May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4741 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430303664303566393763346137303137326531636335326339353436 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4741 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430303664303566393763346137303137326531636335326339353436 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit: BPF prog-id=186 op=LOAD May 15 10:39:55.190000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0003de000 items=0 ppid=4741 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430303664303566393763346137303137326531636335326339353436 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit: BPF prog-id=187 op=LOAD May 15 10:39:55.190000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0003de048 items=0 ppid=4741 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430303664303566393763346137303137326531636335326339353436 May 15 10:39:55.190000 audit: BPF prog-id=187 op=UNLOAD May 15 10:39:55.190000 audit: BPF prog-id=186 op=UNLOAD May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { perfmon } for pid=4751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit[4751]: AVC avc: denied { bpf } for pid=4751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.190000 audit: BPF prog-id=188 op=LOAD May 15 10:39:55.190000 audit[4751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0003de458 items=0 ppid=4741 pid=4751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430303664303566393763346137303137326531636335326339353436 May 15 10:39:55.192239 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:55.211145 env[1202]: time="2025-05-15T10:39:55.211086288Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-7db6d8ff4d-d5ptl,Uid:977383d6-9b09-4182-9d9f-aa8e054ab44e,Namespace:kube-system,Attempt:1,} returns sandbox id \"4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e\"" May 15 10:39:55.211886 kubelet[2038]: E0515 10:39:55.211864 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:55.213701 env[1202]: time="2025-05-15T10:39:55.213661002Z" level=info msg="CreateContainer within sandbox \"4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:39:55.227512 env[1202]: time="2025-05-15T10:39:55.225916689Z" level=info msg="CreateContainer within sandbox \"4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"30127b9ac89c05d9828b0d0318c9da96d033967626e897f6383577c2b535fcd7\"" May 15 10:39:55.227512 env[1202]: time="2025-05-15T10:39:55.227255244Z" level=info msg="StartContainer for \"30127b9ac89c05d9828b0d0318c9da96d033967626e897f6383577c2b535fcd7\"" May 15 10:39:55.241045 systemd[1]: Started cri-containerd-30127b9ac89c05d9828b0d0318c9da96d033967626e897f6383577c2b535fcd7.scope. May 15 10:39:55.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.251000 audit: BPF prog-id=189 op=LOAD May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4741 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313237623961633839633035643938323862306430333138633964 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4741 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313237623961633839633035643938323862306430333138633964 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit: BPF prog-id=190 op=LOAD May 15 10:39:55.252000 audit[4781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000257d40 items=0 ppid=4741 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313237623961633839633035643938323862306430333138633964 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit: BPF prog-id=191 op=LOAD May 15 10:39:55.252000 audit[4781]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000257d88 items=0 ppid=4741 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313237623961633839633035643938323862306430333138633964 May 15 10:39:55.252000 audit: BPF prog-id=191 op=UNLOAD May 15 10:39:55.252000 audit: BPF prog-id=190 op=UNLOAD May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { perfmon } for pid=4781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit[4781]: AVC avc: denied { bpf } for pid=4781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.252000 audit: BPF prog-id=192 op=LOAD May 15 10:39:55.252000 audit[4781]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003a4198 items=0 ppid=4741 pid=4781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.252000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330313237623961633839633035643938323862306430333138633964 May 15 10:39:55.264955 env[1202]: time="2025-05-15T10:39:55.264902666Z" level=info msg="StartContainer for \"30127b9ac89c05d9828b0d0318c9da96d033967626e897f6383577c2b535fcd7\" returns successfully" May 15 10:39:55.286987 kubelet[2038]: E0515 10:39:55.286955 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:55.287857 kubelet[2038]: E0515 10:39:55.287823 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:55.306000 audit[4813]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:55.306000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe719be720 a2=0 a3=7ffe719be70c items=0 ppid=2237 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:55.310000 audit[4813]: NETFILTER_CFG table=nat:108 family=2 entries=44 op=nft_register_rule pid=4813 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:55.310000 audit[4813]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe719be720 a2=0 a3=7ffe719be70c items=0 ppid=2237 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:56.289051 kubelet[2038]: E0515 10:39:56.289020 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:56.298614 kubelet[2038]: I0515 10:39:56.298561 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-7db6d8ff4d-d5ptl" podStartSLOduration=77.298542887 podStartE2EDuration="1m17.298542887s" podCreationTimestamp="2025-05-15 10:38:39 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:55.298679671 +0000 UTC m=+90.411940304" watchObservedRunningTime="2025-05-15 10:39:56.298542887 +0000 UTC m=+91.411803530" May 15 10:39:56.306000 audit[4821]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:56.306000 audit[4821]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffdf16902b0 a2=0 a3=7ffdf169029c items=0 ppid=2237 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.306000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:56.316000 audit[4821]: NETFILTER_CFG table=nat:110 family=2 entries=56 op=nft_register_chain pid=4821 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:56.316000 audit[4821]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffdf16902b0 a2=0 a3=7ffdf169029c items=0 ppid=2237 pid=4821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.316000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:56.971582 env[1202]: time="2025-05-15T10:39:56.971535386Z" level=info msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" May 15 10:39:56.985337 systemd-networkd[1035]: calid6111490877: Gained IPv6LL May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.016 [INFO][4839] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.017 [INFO][4839] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" iface="eth0" netns="/var/run/netns/cni-a353761a-7be9-d00b-b690-4ac8e840ec9c" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.017 [INFO][4839] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" iface="eth0" netns="/var/run/netns/cni-a353761a-7be9-d00b-b690-4ac8e840ec9c" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.017 [INFO][4839] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" iface="eth0" netns="/var/run/netns/cni-a353761a-7be9-d00b-b690-4ac8e840ec9c" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.017 [INFO][4839] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.017 [INFO][4839] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.034 [INFO][4847] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.034 [INFO][4847] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.034 [INFO][4847] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.040 [WARNING][4847] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.040 [INFO][4847] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.041 [INFO][4847] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:57.044938 env[1202]: 2025-05-15 10:39:57.043 [INFO][4839] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:39:57.045401 env[1202]: time="2025-05-15T10:39:57.045076596Z" level=info msg="TearDown network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" successfully" May 15 10:39:57.045401 env[1202]: time="2025-05-15T10:39:57.045122273Z" level=info msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" returns successfully" May 15 10:39:57.045736 env[1202]: time="2025-05-15T10:39:57.045713386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pgdpk,Uid:eef1f6f4-36a9-4963-8ebe-9f756661b798,Namespace:calico-system,Attempt:1,}" May 15 10:39:57.047256 systemd[1]: run-netns-cni\x2da353761a\x2d7be9\x2dd00b\x2db690\x2d4ac8e840ec9c.mount: Deactivated successfully. May 15 10:39:57.122275 systemd[1]: Started sshd@21-10.0.0.44:22-10.0.0.1:36038.service. May 15 10:39:57.127971 kernel: kauditd_printk_skb: 259 callbacks suppressed May 15 10:39:57.128012 kernel: audit: type=1130 audit(1747305597.121:1378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.44:22-10.0.0.1:36038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:57.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.44:22-10.0.0.1:36038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:57.145055 systemd-networkd[1035]: calib638371c06f: Link UP May 15 10:39:57.147696 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:57.147748 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib638371c06f: link becomes ready May 15 10:39:57.147883 systemd-networkd[1035]: calib638371c06f: Gained carrier May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.081 [INFO][4856] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--pgdpk-eth0 csi-node-driver- calico-system eef1f6f4-36a9-4963-8ebe-9f756661b798 1141 0 2025-05-15 10:38:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b7b4b9d k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-pgdpk eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calib638371c06f [] []}} ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Namespace="calico-system" Pod="csi-node-driver-pgdpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--pgdpk-" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.081 [INFO][4856] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Namespace="calico-system" Pod="csi-node-driver-pgdpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.104 [INFO][4871] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" HandleID="k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.110 [INFO][4871] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" HandleID="k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5c50), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-pgdpk", "timestamp":"2025-05-15 10:39:57.104704028 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.110 [INFO][4871] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.110 [INFO][4871] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.110 [INFO][4871] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.112 [INFO][4871] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.115 [INFO][4871] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.119 [INFO][4871] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.121 [INFO][4871] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.128 [INFO][4871] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.128 [INFO][4871] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.130 [INFO][4871] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.133 [INFO][4871] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.139 [INFO][4871] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.139 [INFO][4871] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" host="localhost" May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.139 [INFO][4871] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:57.157306 env[1202]: 2025-05-15 10:39:57.139 [INFO][4871] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" HandleID="k8s-pod-network.5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.157937 env[1202]: 2025-05-15 10:39:57.142 [INFO][4856] cni-plugin/k8s.go 386: Populated endpoint ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Namespace="calico-system" Pod="csi-node-driver-pgdpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--pgdpk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--pgdpk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eef1f6f4-36a9-4963-8ebe-9f756661b798", ResourceVersion:"1141", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-pgdpk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib638371c06f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:57.157937 env[1202]: 2025-05-15 10:39:57.142 [INFO][4856] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Namespace="calico-system" Pod="csi-node-driver-pgdpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.157937 env[1202]: 2025-05-15 10:39:57.142 [INFO][4856] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib638371c06f ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Namespace="calico-system" Pod="csi-node-driver-pgdpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.157937 env[1202]: 2025-05-15 10:39:57.148 [INFO][4856] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Namespace="calico-system" Pod="csi-node-driver-pgdpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.157937 env[1202]: 2025-05-15 10:39:57.148 [INFO][4856] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Namespace="calico-system" Pod="csi-node-driver-pgdpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--pgdpk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--pgdpk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eef1f6f4-36a9-4963-8ebe-9f756661b798", ResourceVersion:"1141", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef", Pod:"csi-node-driver-pgdpk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib638371c06f", MAC:"b2:21:9b:9d:f2:40", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:57.157937 env[1202]: 2025-05-15 10:39:57.155 [INFO][4856] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef" Namespace="calico-system" Pod="csi-node-driver-pgdpk" WorkloadEndpoint="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:39:57.159000 audit[4880]: USER_ACCT pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.161211 sshd[4880]: Accepted publickey for core from 10.0.0.1 port 36038 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:39:57.178458 kernel: audit: type=1101 audit(1747305597.159:1379): pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.178525 kernel: audit: type=1325 audit(1747305597.163:1380): table=filter:111 family=2 entries=42 op=nft_register_chain pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:57.178545 kernel: audit: type=1300 audit(1747305597.163:1380): arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7fffff269400 a2=0 a3=7fffff2693ec items=0 ppid=4282 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.163000 audit[4898]: NETFILTER_CFG table=filter:111 family=2 entries=42 op=nft_register_chain pid=4898 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:57.163000 audit[4898]: SYSCALL arch=c000003e syscall=46 success=yes exit=21524 a0=3 a1=7fffff269400 a2=0 a3=7fffff2693ec items=0 ppid=4282 pid=4898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.169895 systemd[1]: Started session-22.scope. May 15 10:39:57.165385 sshd[4880]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:57.170194 systemd-logind[1192]: New session 22 of user core. May 15 10:39:57.163000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:57.163000 audit[4880]: CRED_ACQ pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.191838 kernel: audit: type=1327 audit(1747305597.163:1380): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:57.191880 kernel: audit: type=1103 audit(1747305597.163:1381): pid=4880 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.191900 kernel: audit: type=1006 audit(1747305597.163:1382): pid=4880 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 10:39:57.191919 kernel: audit: type=1300 audit(1747305597.163:1382): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2ec70850 a2=3 a3=0 items=0 ppid=1 pid=4880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.163000 audit[4880]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc2ec70850 a2=3 a3=0 items=0 ppid=1 pid=4880 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.192214 env[1202]: time="2025-05-15T10:39:57.187285413Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:57.192214 env[1202]: time="2025-05-15T10:39:57.187351057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:57.192214 env[1202]: time="2025-05-15T10:39:57.187372929Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:57.192214 env[1202]: time="2025-05-15T10:39:57.187568460Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef pid=4906 runtime=io.containerd.runc.v2 May 15 10:39:57.163000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:57.198112 kernel: audit: type=1327 audit(1747305597.163:1382): proctitle=737368643A20636F7265205B707269765D May 15 10:39:57.198154 kernel: audit: type=1105 audit(1747305597.176:1383): pid=4880 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.176000 audit[4880]: USER_START pid=4880 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.178000 audit[4899]: CRED_ACQ pid=4899 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.205550 systemd[1]: Started cri-containerd-5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef.scope. May 15 10:39:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.212000 audit: BPF prog-id=193 op=LOAD May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4906 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562376564643736356231313035336237336430353233333463623338 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4906 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562376564643736356231313035336237336430353233333463623338 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit: BPF prog-id=194 op=LOAD May 15 10:39:57.213000 audit[4918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003aa590 items=0 ppid=4906 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562376564643736356231313035336237336430353233333463623338 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit: BPF prog-id=195 op=LOAD May 15 10:39:57.213000 audit[4918]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003aa5d8 items=0 ppid=4906 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562376564643736356231313035336237336430353233333463623338 May 15 10:39:57.213000 audit: BPF prog-id=195 op=UNLOAD May 15 10:39:57.213000 audit: BPF prog-id=194 op=UNLOAD May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { perfmon } for pid=4918 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit[4918]: AVC avc: denied { bpf } for pid=4918 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:57.213000 audit: BPF prog-id=196 op=LOAD May 15 10:39:57.213000 audit[4918]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003aa9e8 items=0 ppid=4906 pid=4918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562376564643736356231313035336237336430353233333463623338 May 15 10:39:57.215166 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:57.224601 env[1202]: time="2025-05-15T10:39:57.224492593Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-pgdpk,Uid:eef1f6f4-36a9-4963-8ebe-9f756661b798,Namespace:calico-system,Attempt:1,} returns sandbox id \"5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef\"" May 15 10:39:57.226452 env[1202]: time="2025-05-15T10:39:57.226377955Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:39:57.283364 sshd[4880]: pam_unix(sshd:session): session closed for user core May 15 10:39:57.283000 audit[4880]: USER_END pid=4880 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.283000 audit[4880]: CRED_DISP pid=4880 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.285804 systemd[1]: sshd@21-10.0.0.44:22-10.0.0.1:36038.service: Deactivated successfully. May 15 10:39:57.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.44:22-10.0.0.1:36038 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:57.286506 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:39:57.287241 systemd-logind[1192]: Session 22 logged out. Waiting for processes to exit. May 15 10:39:57.287888 systemd-logind[1192]: Removed session 22. May 15 10:39:57.291393 kubelet[2038]: E0515 10:39:57.291362 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:57.972542 env[1202]: time="2025-05-15T10:39:57.972493659Z" level=info msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.011 [INFO][4967] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.012 [INFO][4967] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" iface="eth0" netns="/var/run/netns/cni-5f77a07a-9d4e-7392-bc69-92a58029c82e" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.012 [INFO][4967] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" iface="eth0" netns="/var/run/netns/cni-5f77a07a-9d4e-7392-bc69-92a58029c82e" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.012 [INFO][4967] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" iface="eth0" netns="/var/run/netns/cni-5f77a07a-9d4e-7392-bc69-92a58029c82e" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.012 [INFO][4967] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.012 [INFO][4967] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.028 [INFO][4975] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.029 [INFO][4975] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.029 [INFO][4975] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.034 [WARNING][4975] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.034 [INFO][4975] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.036 [INFO][4975] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.039192 env[1202]: 2025-05-15 10:39:58.037 [INFO][4967] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:39:58.039708 env[1202]: time="2025-05-15T10:39:58.039292191Z" level=info msg="TearDown network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" successfully" May 15 10:39:58.039708 env[1202]: time="2025-05-15T10:39:58.039315675Z" level=info msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" returns successfully" May 15 10:39:58.039953 env[1202]: time="2025-05-15T10:39:58.039911076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b9c694b5b-s5dhd,Uid:a549a8f9-4c84-43d4-aeaf-975efd7251f9,Namespace:calico-system,Attempt:1,}" May 15 10:39:58.047507 systemd[1]: run-netns-cni\x2d5f77a07a\x2d9d4e\x2d7392\x2dbc69\x2d92a58029c82e.mount: Deactivated successfully. May 15 10:39:58.132246 systemd-networkd[1035]: caliaac4e9160c9: Link UP May 15 10:39:58.133802 systemd-networkd[1035]: caliaac4e9160c9: Gained carrier May 15 10:39:58.134115 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliaac4e9160c9: link becomes ready May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.080 [INFO][4983] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0 calico-kube-controllers-5b9c694b5b- calico-system a549a8f9-4c84-43d4-aeaf-975efd7251f9 1151 0 2025-05-15 10:38:47 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5b9c694b5b projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5b9c694b5b-s5dhd eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] caliaac4e9160c9 [] []}} ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Namespace="calico-system" Pod="calico-kube-controllers-5b9c694b5b-s5dhd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.080 [INFO][4983] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Namespace="calico-system" Pod="calico-kube-controllers-5b9c694b5b-s5dhd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.102 [INFO][4997] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" HandleID="k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.109 [INFO][4997] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" HandleID="k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dcb60), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5b9c694b5b-s5dhd", "timestamp":"2025-05-15 10:39:58.102421287 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.109 [INFO][4997] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.109 [INFO][4997] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.109 [INFO][4997] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.110 [INFO][4997] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.113 [INFO][4997] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.116 [INFO][4997] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.117 [INFO][4997] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.119 [INFO][4997] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.119 [INFO][4997] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.120 [INFO][4997] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5 May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.123 [INFO][4997] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.127 [INFO][4997] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.127 [INFO][4997] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" host="localhost" May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.128 [INFO][4997] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.144637 env[1202]: 2025-05-15 10:39:58.128 [INFO][4997] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" HandleID="k8s-pod-network.c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.145747 env[1202]: 2025-05-15 10:39:58.130 [INFO][4983] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Namespace="calico-system" Pod="calico-kube-controllers-5b9c694b5b-s5dhd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0", GenerateName:"calico-kube-controllers-5b9c694b5b-", Namespace:"calico-system", SelfLink:"", UID:"a549a8f9-4c84-43d4-aeaf-975efd7251f9", ResourceVersion:"1151", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b9c694b5b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5b9c694b5b-s5dhd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaac4e9160c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.145747 env[1202]: 2025-05-15 10:39:58.130 [INFO][4983] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Namespace="calico-system" Pod="calico-kube-controllers-5b9c694b5b-s5dhd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.145747 env[1202]: 2025-05-15 10:39:58.130 [INFO][4983] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliaac4e9160c9 ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Namespace="calico-system" Pod="calico-kube-controllers-5b9c694b5b-s5dhd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.145747 env[1202]: 2025-05-15 10:39:58.134 [INFO][4983] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Namespace="calico-system" Pod="calico-kube-controllers-5b9c694b5b-s5dhd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.145747 env[1202]: 2025-05-15 10:39:58.134 [INFO][4983] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Namespace="calico-system" Pod="calico-kube-controllers-5b9c694b5b-s5dhd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0", GenerateName:"calico-kube-controllers-5b9c694b5b-", Namespace:"calico-system", SelfLink:"", UID:"a549a8f9-4c84-43d4-aeaf-975efd7251f9", ResourceVersion:"1151", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b9c694b5b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5", Pod:"calico-kube-controllers-5b9c694b5b-s5dhd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaac4e9160c9", MAC:"7e:e3:6f:1c:64:d8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.145747 env[1202]: 2025-05-15 10:39:58.142 [INFO][4983] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5" Namespace="calico-system" Pod="calico-kube-controllers-5b9c694b5b-s5dhd" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:39:58.153000 audit[5019]: NETFILTER_CFG table=filter:112 family=2 entries=48 op=nft_register_chain pid=5019 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:58.153000 audit[5019]: SYSCALL arch=c000003e syscall=46 success=yes exit=23868 a0=3 a1=7ffd9c59fda0 a2=0 a3=7ffd9c59fd8c items=0 ppid=4282 pid=5019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.153000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:58.158943 env[1202]: time="2025-05-15T10:39:58.158869335Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:58.158943 env[1202]: time="2025-05-15T10:39:58.158906776Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:58.158943 env[1202]: time="2025-05-15T10:39:58.158917477Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:58.159356 env[1202]: time="2025-05-15T10:39:58.159150700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5 pid=5027 runtime=io.containerd.runc.v2 May 15 10:39:58.175489 systemd[1]: Started cri-containerd-c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5.scope. May 15 10:39:58.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.183000 audit: BPF prog-id=197 op=LOAD May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5027 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337356662396538653338626464333034343165376364353565626139 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5027 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337356662396538653338626464333034343165376364353565626139 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit: BPF prog-id=198 op=LOAD May 15 10:39:58.184000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003f20b0 items=0 ppid=5027 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337356662396538653338626464333034343165376364353565626139 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit: BPF prog-id=199 op=LOAD May 15 10:39:58.184000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003f20f8 items=0 ppid=5027 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337356662396538653338626464333034343165376364353565626139 May 15 10:39:58.184000 audit: BPF prog-id=199 op=UNLOAD May 15 10:39:58.184000 audit: BPF prog-id=198 op=UNLOAD May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { perfmon } for pid=5037 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit[5037]: AVC avc: denied { bpf } for pid=5037 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.184000 audit: BPF prog-id=200 op=LOAD May 15 10:39:58.184000 audit[5037]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f2508 items=0 ppid=5027 pid=5037 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337356662396538653338626464333034343165376364353565626139 May 15 10:39:58.187523 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:58.209595 env[1202]: time="2025-05-15T10:39:58.209548759Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5b9c694b5b-s5dhd,Uid:a549a8f9-4c84-43d4-aeaf-975efd7251f9,Namespace:calico-system,Attempt:1,} returns sandbox id \"c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5\"" May 15 10:39:58.294241 kubelet[2038]: E0515 10:39:58.294156 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:58.737649 env[1202]: time="2025-05-15T10:39:58.737589864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:58.739356 env[1202]: time="2025-05-15T10:39:58.739326962Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:58.740732 env[1202]: time="2025-05-15T10:39:58.740695612Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:58.742053 env[1202]: time="2025-05-15T10:39:58.742022040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:58.742450 env[1202]: time="2025-05-15T10:39:58.742424185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 10:39:58.743298 env[1202]: time="2025-05-15T10:39:58.743268147Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:39:58.744407 env[1202]: time="2025-05-15T10:39:58.744368958Z" level=info msg="CreateContainer within sandbox \"5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:39:58.758579 env[1202]: time="2025-05-15T10:39:58.758513509Z" level=info msg="CreateContainer within sandbox \"5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"0976bc14125423cdb90901a8197381ad26159a39959454a14151aa66ab56c653\"" May 15 10:39:58.759134 env[1202]: time="2025-05-15T10:39:58.759072230Z" level=info msg="StartContainer for \"0976bc14125423cdb90901a8197381ad26159a39959454a14151aa66ab56c653\"" May 15 10:39:58.773225 systemd[1]: Started cri-containerd-0976bc14125423cdb90901a8197381ad26159a39959454a14151aa66ab56c653.scope. May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa5543891c0 items=0 ppid=4906 pid=5067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373662633134313235343233636462393039303161383139373338 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit: BPF prog-id=201 op=LOAD May 15 10:39:58.790000 audit[5067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000344748 items=0 ppid=4906 pid=5067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373662633134313235343233636462393039303161383139373338 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.790000 audit: BPF prog-id=202 op=LOAD May 15 10:39:58.790000 audit[5067]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000344798 items=0 ppid=4906 pid=5067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373662633134313235343233636462393039303161383139373338 May 15 10:39:58.791000 audit: BPF prog-id=202 op=UNLOAD May 15 10:39:58.791000 audit: BPF prog-id=201 op=UNLOAD May 15 10:39:58.791000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { perfmon } for pid=5067 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit[5067]: AVC avc: denied { bpf } for pid=5067 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.791000 audit: BPF prog-id=203 op=LOAD May 15 10:39:58.791000 audit[5067]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000344828 items=0 ppid=4906 pid=5067 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039373662633134313235343233636462393039303161383139373338 May 15 10:39:58.815775 env[1202]: time="2025-05-15T10:39:58.815724016Z" level=info msg="StartContainer for \"0976bc14125423cdb90901a8197381ad26159a39959454a14151aa66ab56c653\" returns successfully" May 15 10:39:58.971756 kubelet[2038]: E0515 10:39:58.971721 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:58.973381 env[1202]: time="2025-05-15T10:39:58.973336863Z" level=info msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" May 15 10:39:59.037457 systemd-networkd[1035]: calib638371c06f: Gained IPv6LL May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.016 [INFO][5112] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.016 [INFO][5112] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" iface="eth0" netns="/var/run/netns/cni-096dbf04-f84f-0515-1d5d-6fbb0c7f7651" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.016 [INFO][5112] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" iface="eth0" netns="/var/run/netns/cni-096dbf04-f84f-0515-1d5d-6fbb0c7f7651" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.016 [INFO][5112] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" iface="eth0" netns="/var/run/netns/cni-096dbf04-f84f-0515-1d5d-6fbb0c7f7651" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.016 [INFO][5112] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.016 [INFO][5112] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.036 [INFO][5120] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.036 [INFO][5120] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.037 [INFO][5120] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.043 [WARNING][5120] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.043 [INFO][5120] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.044 [INFO][5120] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:59.050594 env[1202]: 2025-05-15 10:39:59.049 [INFO][5112] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:39:59.051181 env[1202]: time="2025-05-15T10:39:59.050825802Z" level=info msg="TearDown network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" successfully" May 15 10:39:59.051181 env[1202]: time="2025-05-15T10:39:59.050866699Z" level=info msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" returns successfully" May 15 10:39:59.052543 systemd[1]: run-netns-cni\x2d096dbf04\x2df84f\x2d0515\x2d1d5d\x2d6fbb0c7f7651.mount: Deactivated successfully. May 15 10:39:59.053249 env[1202]: time="2025-05-15T10:39:59.053229966Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f7ddb74b-fxxpk,Uid:af843951-e0be-4fdf-bf7c-7b61c7a66c0c,Namespace:calico-apiserver,Attempt:1,}" May 15 10:39:59.147083 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:59.147656 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif768e5dce5c: link becomes ready May 15 10:39:59.145965 systemd-networkd[1035]: calif768e5dce5c: Link UP May 15 10:39:59.147022 systemd-networkd[1035]: calif768e5dce5c: Gained carrier May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.090 [INFO][5130] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0 calico-apiserver-57f7ddb74b- calico-apiserver af843951-e0be-4fdf-bf7c-7b61c7a66c0c 1170 0 2025-05-15 10:38:46 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:57f7ddb74b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-57f7ddb74b-fxxpk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif768e5dce5c [] []}} ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-fxxpk" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.091 [INFO][5130] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-fxxpk" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.113 [INFO][5146] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" HandleID="k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.120 [INFO][5146] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" HandleID="k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000503c10), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-57f7ddb74b-fxxpk", "timestamp":"2025-05-15 10:39:59.113535516 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.120 [INFO][5146] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.120 [INFO][5146] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.120 [INFO][5146] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.121 [INFO][5146] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.124 [INFO][5146] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.127 [INFO][5146] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.128 [INFO][5146] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.130 [INFO][5146] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.130 [INFO][5146] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.132 [INFO][5146] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.136 [INFO][5146] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.141 [INFO][5146] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.141 [INFO][5146] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" host="localhost" May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.141 [INFO][5146] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:59.158807 env[1202]: 2025-05-15 10:39:59.141 [INFO][5146] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" HandleID="k8s-pod-network.8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.160113 env[1202]: 2025-05-15 10:39:59.143 [INFO][5130] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-fxxpk" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0", GenerateName:"calico-apiserver-57f7ddb74b-", Namespace:"calico-apiserver", SelfLink:"", UID:"af843951-e0be-4fdf-bf7c-7b61c7a66c0c", ResourceVersion:"1170", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f7ddb74b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-57f7ddb74b-fxxpk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif768e5dce5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:59.160113 env[1202]: 2025-05-15 10:39:59.143 [INFO][5130] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-fxxpk" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.160113 env[1202]: 2025-05-15 10:39:59.143 [INFO][5130] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif768e5dce5c ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-fxxpk" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.160113 env[1202]: 2025-05-15 10:39:59.147 [INFO][5130] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-fxxpk" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.160113 env[1202]: 2025-05-15 10:39:59.147 [INFO][5130] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-fxxpk" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0", GenerateName:"calico-apiserver-57f7ddb74b-", Namespace:"calico-apiserver", SelfLink:"", UID:"af843951-e0be-4fdf-bf7c-7b61c7a66c0c", ResourceVersion:"1170", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f7ddb74b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d", Pod:"calico-apiserver-57f7ddb74b-fxxpk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif768e5dce5c", MAC:"76:26:56:9a:18:33", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:59.160113 env[1202]: 2025-05-15 10:39:59.156 [INFO][5130] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-fxxpk" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:39:59.171423 env[1202]: time="2025-05-15T10:39:59.171366017Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:59.171592 env[1202]: time="2025-05-15T10:39:59.171401164Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:59.171592 env[1202]: time="2025-05-15T10:39:59.171428627Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:59.171725 env[1202]: time="2025-05-15T10:39:59.171585384Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d pid=5175 runtime=io.containerd.runc.v2 May 15 10:39:59.172000 audit[5183]: NETFILTER_CFG table=filter:113 family=2 entries=52 op=nft_register_chain pid=5183 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:59.172000 audit[5183]: SYSCALL arch=c000003e syscall=46 success=yes exit=27040 a0=3 a1=7ffc33a83be0 a2=0 a3=7ffc33a83bcc items=0 ppid=4282 pid=5183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.172000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:59.182878 systemd[1]: Started cri-containerd-8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d.scope. May 15 10:39:59.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit: BPF prog-id=204 op=LOAD May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001cfc48 a2=10 a3=1c items=0 ppid=5175 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313931383737303861643339656265343666636231396165633064 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001cf6b0 a2=3c a3=c items=0 ppid=5175 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313931383737303861643339656265343666636231396165633064 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit: BPF prog-id=205 op=LOAD May 15 10:39:59.192000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cf9d8 a2=78 a3=c000024910 items=0 ppid=5175 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313931383737303861643339656265343666636231396165633064 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit: BPF prog-id=206 op=LOAD May 15 10:39:59.192000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001cf770 a2=78 a3=c000024958 items=0 ppid=5175 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313931383737303861643339656265343666636231396165633064 May 15 10:39:59.192000 audit: BPF prog-id=206 op=UNLOAD May 15 10:39:59.192000 audit: BPF prog-id=205 op=UNLOAD May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { perfmon } for pid=5185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit[5185]: AVC avc: denied { bpf } for pid=5185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.192000 audit: BPF prog-id=207 op=LOAD May 15 10:39:59.192000 audit[5185]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001cfc30 a2=78 a3=c000024d68 items=0 ppid=5175 pid=5185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313931383737303861643339656265343666636231396165633064 May 15 10:39:59.194598 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:59.215540 env[1202]: time="2025-05-15T10:39:59.215483434Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f7ddb74b-fxxpk,Uid:af843951-e0be-4fdf-bf7c-7b61c7a66c0c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d\"" May 15 10:40:00.184265 systemd-networkd[1035]: caliaac4e9160c9: Gained IPv6LL May 15 10:40:00.972103 env[1202]: time="2025-05-15T10:40:00.972044465Z" level=info msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" May 15 10:40:01.018234 systemd-networkd[1035]: calif768e5dce5c: Gained IPv6LL May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.048 [INFO][5226] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.048 [INFO][5226] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" iface="eth0" netns="/var/run/netns/cni-6f884be5-f87d-7681-7cbb-4c3e49cff810" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.049 [INFO][5226] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" iface="eth0" netns="/var/run/netns/cni-6f884be5-f87d-7681-7cbb-4c3e49cff810" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.049 [INFO][5226] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" iface="eth0" netns="/var/run/netns/cni-6f884be5-f87d-7681-7cbb-4c3e49cff810" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.049 [INFO][5226] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.049 [INFO][5226] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.107 [INFO][5235] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.107 [INFO][5235] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.108 [INFO][5235] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.113 [WARNING][5235] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.113 [INFO][5235] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.114 [INFO][5235] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:01.118953 env[1202]: 2025-05-15 10:40:01.116 [INFO][5226] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:01.122033 env[1202]: time="2025-05-15T10:40:01.119860381Z" level=info msg="TearDown network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" successfully" May 15 10:40:01.122033 env[1202]: time="2025-05-15T10:40:01.119896339Z" level=info msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" returns successfully" May 15 10:40:01.122033 env[1202]: time="2025-05-15T10:40:01.120509473Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f7ddb74b-w96td,Uid:38e13e26-0f53-4fa0-b34d-bef637b8c73d,Namespace:calico-apiserver,Attempt:1,}" May 15 10:40:01.121452 systemd[1]: run-netns-cni\x2d6f884be5\x2df87d\x2d7681\x2d7cbb\x2d4c3e49cff810.mount: Deactivated successfully. May 15 10:40:01.240204 systemd-networkd[1035]: cali3d70f89818b: Link UP May 15 10:40:01.244296 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:40:01.244486 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali3d70f89818b: link becomes ready May 15 10:40:01.244549 systemd-networkd[1035]: cali3d70f89818b: Gained carrier May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.167 [INFO][5242] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0 calico-apiserver-57f7ddb74b- calico-apiserver 38e13e26-0f53-4fa0-b34d-bef637b8c73d 1184 0 2025-05-15 10:38:46 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:57f7ddb74b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-57f7ddb74b-w96td eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali3d70f89818b [] []}} ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-w96td" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.167 [INFO][5242] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-w96td" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.202 [INFO][5264] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" HandleID="k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.208 [INFO][5264] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" HandleID="k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000434e90), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-57f7ddb74b-w96td", "timestamp":"2025-05-15 10:40:01.202022869 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.208 [INFO][5264] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.208 [INFO][5264] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.208 [INFO][5264] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.210 [INFO][5264] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.218 [INFO][5264] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.223 [INFO][5264] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.224 [INFO][5264] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.226 [INFO][5264] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.226 [INFO][5264] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.227 [INFO][5264] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66 May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.230 [INFO][5264] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.236 [INFO][5264] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.236 [INFO][5264] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" host="localhost" May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.236 [INFO][5264] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:01.259872 env[1202]: 2025-05-15 10:40:01.236 [INFO][5264] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" HandleID="k8s-pod-network.0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.260601 env[1202]: 2025-05-15 10:40:01.238 [INFO][5242] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-w96td" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0", GenerateName:"calico-apiserver-57f7ddb74b-", Namespace:"calico-apiserver", SelfLink:"", UID:"38e13e26-0f53-4fa0-b34d-bef637b8c73d", ResourceVersion:"1184", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f7ddb74b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-57f7ddb74b-w96td", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3d70f89818b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:01.260601 env[1202]: 2025-05-15 10:40:01.238 [INFO][5242] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-w96td" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.260601 env[1202]: 2025-05-15 10:40:01.238 [INFO][5242] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali3d70f89818b ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-w96td" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.260601 env[1202]: 2025-05-15 10:40:01.244 [INFO][5242] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-w96td" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.260601 env[1202]: 2025-05-15 10:40:01.245 [INFO][5242] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-w96td" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0", GenerateName:"calico-apiserver-57f7ddb74b-", Namespace:"calico-apiserver", SelfLink:"", UID:"38e13e26-0f53-4fa0-b34d-bef637b8c73d", ResourceVersion:"1184", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f7ddb74b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66", Pod:"calico-apiserver-57f7ddb74b-w96td", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3d70f89818b", MAC:"f2:2f:a0:ff:e0:e1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:01.260601 env[1202]: 2025-05-15 10:40:01.258 [INFO][5242] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66" Namespace="calico-apiserver" Pod="calico-apiserver-57f7ddb74b-w96td" WorkloadEndpoint="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:01.270000 audit[5284]: NETFILTER_CFG table=filter:114 family=2 entries=46 op=nft_register_chain pid=5284 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:01.270000 audit[5284]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffc2e06a0e0 a2=0 a3=7ffc2e06a0cc items=0 ppid=4282 pid=5284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.270000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:01.277137 env[1202]: time="2025-05-15T10:40:01.277063473Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:01.277137 env[1202]: time="2025-05-15T10:40:01.277119489Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:01.277137 env[1202]: time="2025-05-15T10:40:01.277130291Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:01.277387 env[1202]: time="2025-05-15T10:40:01.277343174Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66 pid=5291 runtime=io.containerd.runc.v2 May 15 10:40:01.295692 systemd[1]: Started cri-containerd-0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66.scope. May 15 10:40:01.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit: BPF prog-id=208 op=LOAD May 15 10:40:01.308000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5291 pid=5302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613264333539666530616165356637346464373039646232393263 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5291 pid=5302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613264333539666530616165356637346464373039646232393263 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.308000 audit: BPF prog-id=209 op=LOAD May 15 10:40:01.308000 audit[5302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c2880 items=0 ppid=5291 pid=5302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613264333539666530616165356637346464373039646232393263 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit: BPF prog-id=210 op=LOAD May 15 10:40:01.309000 audit[5302]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c28c8 items=0 ppid=5291 pid=5302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613264333539666530616165356637346464373039646232393263 May 15 10:40:01.309000 audit: BPF prog-id=210 op=UNLOAD May 15 10:40:01.309000 audit: BPF prog-id=209 op=UNLOAD May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { perfmon } for pid=5302 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit[5302]: AVC avc: denied { bpf } for pid=5302 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.309000 audit: BPF prog-id=211 op=LOAD May 15 10:40:01.309000 audit[5302]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2cd8 items=0 ppid=5291 pid=5302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064613264333539666530616165356637346464373039646232393263 May 15 10:40:01.310911 systemd-resolved[1142]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:01.336133 env[1202]: time="2025-05-15T10:40:01.336084192Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-57f7ddb74b-w96td,Uid:38e13e26-0f53-4fa0-b34d-bef637b8c73d,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66\"" May 15 10:40:01.823228 env[1202]: time="2025-05-15T10:40:01.823182178Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:01.824941 env[1202]: time="2025-05-15T10:40:01.824911548Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:01.826568 env[1202]: time="2025-05-15T10:40:01.826523016Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:01.827883 env[1202]: time="2025-05-15T10:40:01.827850515Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:01.828297 env[1202]: time="2025-05-15T10:40:01.828256195Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 10:40:01.829177 env[1202]: time="2025-05-15T10:40:01.829154880Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:40:01.834907 env[1202]: time="2025-05-15T10:40:01.834867259Z" level=info msg="CreateContainer within sandbox \"c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:40:01.848625 env[1202]: time="2025-05-15T10:40:01.848581651Z" level=info msg="CreateContainer within sandbox \"c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"db159bd1a83547b32c7f5a5717297efa5b54877dfc6190e89d710e880c09f555\"" May 15 10:40:01.849045 env[1202]: time="2025-05-15T10:40:01.848987251Z" level=info msg="StartContainer for \"db159bd1a83547b32c7f5a5717297efa5b54877dfc6190e89d710e880c09f555\"" May 15 10:40:01.863956 systemd[1]: Started cri-containerd-db159bd1a83547b32c7f5a5717297efa5b54877dfc6190e89d710e880c09f555.scope. May 15 10:40:01.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit: BPF prog-id=212 op=LOAD May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=5027 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313539626431613833353437623332633766356135373137323937 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=5027 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313539626431613833353437623332633766356135373137323937 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit: BPF prog-id=213 op=LOAD May 15 10:40:01.877000 audit[5334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00028d080 items=0 ppid=5027 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313539626431613833353437623332633766356135373137323937 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit: BPF prog-id=214 op=LOAD May 15 10:40:01.877000 audit[5334]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00028d0c8 items=0 ppid=5027 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313539626431613833353437623332633766356135373137323937 May 15 10:40:01.877000 audit: BPF prog-id=214 op=UNLOAD May 15 10:40:01.877000 audit: BPF prog-id=213 op=UNLOAD May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { perfmon } for pid=5334 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit[5334]: AVC avc: denied { bpf } for pid=5334 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:01.877000 audit: BPF prog-id=215 op=LOAD May 15 10:40:01.877000 audit[5334]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00028d4d8 items=0 ppid=5027 pid=5334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:01.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462313539626431613833353437623332633766356135373137323937 May 15 10:40:01.902257 env[1202]: time="2025-05-15T10:40:01.902191713Z" level=info msg="StartContainer for \"db159bd1a83547b32c7f5a5717297efa5b54877dfc6190e89d710e880c09f555\" returns successfully" May 15 10:40:01.972367 kubelet[2038]: E0515 10:40:01.972283 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:02.123140 systemd[1]: run-containerd-runc-k8s.io-0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66-runc.TT6npV.mount: Deactivated successfully. May 15 10:40:02.287630 systemd[1]: Started sshd@22-10.0.0.44:22-10.0.0.1:47516.service. May 15 10:40:02.293126 kernel: kauditd_printk_skb: 341 callbacks suppressed May 15 10:40:02.293180 kernel: audit: type=1130 audit(1747305602.286:1487): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.44:22-10.0.0.1:47516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.44:22-10.0.0.1:47516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.321680 kubelet[2038]: I0515 10:40:02.321383 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5b9c694b5b-s5dhd" podStartSLOduration=71.703078888 podStartE2EDuration="1m15.321367077s" podCreationTimestamp="2025-05-15 10:38:47 +0000 UTC" firstStartedPulling="2025-05-15 10:39:58.210678755 +0000 UTC m=+93.323939398" lastFinishedPulling="2025-05-15 10:40:01.828966944 +0000 UTC m=+96.942227587" observedRunningTime="2025-05-15 10:40:02.319746133 +0000 UTC m=+97.433006786" watchObservedRunningTime="2025-05-15 10:40:02.321367077 +0000 UTC m=+97.434627720" May 15 10:40:02.323000 audit[5364]: USER_ACCT pid=5364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.326203 sshd[5364]: Accepted publickey for core from 10.0.0.1 port 47516 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:02.329980 sshd[5364]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:02.330160 kernel: audit: type=1101 audit(1747305602.323:1488): pid=5364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.332194 systemd[1]: run-containerd-runc-k8s.io-db159bd1a83547b32c7f5a5717297efa5b54877dfc6190e89d710e880c09f555-runc.lpPs6m.mount: Deactivated successfully. May 15 10:40:02.328000 audit[5364]: CRED_ACQ pid=5364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.340820 kernel: audit: type=1103 audit(1747305602.328:1489): pid=5364 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.340945 kernel: audit: type=1006 audit(1747305602.328:1490): pid=5364 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 10:40:02.354262 kernel: audit: type=1300 audit(1747305602.328:1490): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd26c4d630 a2=3 a3=0 items=0 ppid=1 pid=5364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.354389 kernel: audit: type=1327 audit(1747305602.328:1490): proctitle=737368643A20636F7265205B707269765D May 15 10:40:02.328000 audit[5364]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd26c4d630 a2=3 a3=0 items=0 ppid=1 pid=5364 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.328000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:02.360330 systemd[1]: Started session-23.scope. May 15 10:40:02.361039 systemd-logind[1192]: New session 23 of user core. May 15 10:40:02.365000 audit[5364]: USER_START pid=5364 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.376855 kernel: audit: type=1105 audit(1747305602.365:1491): pid=5364 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.376945 kernel: audit: type=1103 audit(1747305602.371:1492): pid=5378 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.371000 audit[5378]: CRED_ACQ pid=5378 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.476598 sshd[5364]: pam_unix(sshd:session): session closed for user core May 15 10:40:02.476000 audit[5364]: USER_END pid=5364 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.478856 systemd[1]: sshd@22-10.0.0.44:22-10.0.0.1:47516.service: Deactivated successfully. May 15 10:40:02.479513 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:40:02.476000 audit[5364]: CRED_DISP pid=5364 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.484736 systemd-logind[1192]: Session 23 logged out. Waiting for processes to exit. May 15 10:40:02.485435 kernel: audit: type=1106 audit(1747305602.476:1493): pid=5364 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.485475 kernel: audit: type=1104 audit(1747305602.476:1494): pid=5364 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.44:22-10.0.0.1:47516 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.485597 systemd-logind[1192]: Removed session 23. May 15 10:40:02.744235 systemd-networkd[1035]: cali3d70f89818b: Gained IPv6LL May 15 10:40:03.729448 env[1202]: time="2025-05-15T10:40:03.729396000Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:03.731593 env[1202]: time="2025-05-15T10:40:03.731544915Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:03.732964 env[1202]: time="2025-05-15T10:40:03.732929501Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:03.734399 env[1202]: time="2025-05-15T10:40:03.734370284Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:03.734740 env[1202]: time="2025-05-15T10:40:03.734697825Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 10:40:03.735693 env[1202]: time="2025-05-15T10:40:03.735670479Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:40:03.737887 env[1202]: time="2025-05-15T10:40:03.737852728Z" level=info msg="CreateContainer within sandbox \"5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:40:03.754496 env[1202]: time="2025-05-15T10:40:03.754465332Z" level=info msg="CreateContainer within sandbox \"5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"379d73e01b21b249c930df30d19152c7463511e9156f6e48c99159512a344267\"" May 15 10:40:03.754858 env[1202]: time="2025-05-15T10:40:03.754830876Z" level=info msg="StartContainer for \"379d73e01b21b249c930df30d19152c7463511e9156f6e48c99159512a344267\"" May 15 10:40:03.770308 systemd[1]: run-containerd-runc-k8s.io-379d73e01b21b249c930df30d19152c7463511e9156f6e48c99159512a344267-runc.dPjqAo.mount: Deactivated successfully. May 15 10:40:03.772807 systemd[1]: Started cri-containerd-379d73e01b21b249c930df30d19152c7463511e9156f6e48c99159512a344267.scope. May 15 10:40:03.781000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001a16b0 a2=3c a3=7f07fcb1a368 items=0 ppid=4906 pid=5404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:03.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396437336530316232316232343963393330646633306431393135 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.781000 audit: BPF prog-id=216 op=LOAD May 15 10:40:03.781000 audit[5404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001a19d8 a2=78 a3=c0002d9eb8 items=0 ppid=4906 pid=5404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:03.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396437336530316232316232343963393330646633306431393135 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit: BPF prog-id=217 op=LOAD May 15 10:40:03.782000 audit[5404]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001a1770 a2=78 a3=c0002d9f08 items=0 ppid=4906 pid=5404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:03.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396437336530316232316232343963393330646633306431393135 May 15 10:40:03.782000 audit: BPF prog-id=217 op=UNLOAD May 15 10:40:03.782000 audit: BPF prog-id=216 op=UNLOAD May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { perfmon } for pid=5404 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit[5404]: AVC avc: denied { bpf } for pid=5404 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:03.782000 audit: BPF prog-id=218 op=LOAD May 15 10:40:03.782000 audit[5404]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001a1c30 a2=78 a3=c0002d9f98 items=0 ppid=4906 pid=5404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:03.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337396437336530316232316232343963393330646633306431393135 May 15 10:40:03.795767 env[1202]: time="2025-05-15T10:40:03.795709729Z" level=info msg="StartContainer for \"379d73e01b21b249c930df30d19152c7463511e9156f6e48c99159512a344267\" returns successfully" May 15 10:40:04.062975 kubelet[2038]: I0515 10:40:04.062872 2038 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:40:04.062975 kubelet[2038]: I0515 10:40:04.062903 2038 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:40:04.972323 kubelet[2038]: E0515 10:40:04.972232 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:05.971933 kubelet[2038]: E0515 10:40:05.971885 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:07.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.44:22-10.0.0.1:47528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:07.481232 systemd[1]: Started sshd@23-10.0.0.44:22-10.0.0.1:47528.service. May 15 10:40:07.482229 kernel: kauditd_printk_skb: 44 callbacks suppressed May 15 10:40:07.482299 kernel: audit: type=1130 audit(1747305607.480:1502): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.44:22-10.0.0.1:47528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:07.519000 audit[5461]: USER_ACCT pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.524000 audit[5461]: CRED_ACQ pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.525795 sshd[5461]: Accepted publickey for core from 10.0.0.1 port 47528 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:07.526233 kernel: audit: type=1101 audit(1747305607.519:1503): pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.526308 kernel: audit: type=1103 audit(1747305607.524:1504): pid=5461 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.526200 sshd[5461]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:07.538159 kernel: audit: type=1006 audit(1747305607.524:1505): pid=5461 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 10:40:07.538277 kernel: audit: type=1300 audit(1747305607.524:1505): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff71967d90 a2=3 a3=0 items=0 ppid=1 pid=5461 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.524000 audit[5461]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff71967d90 a2=3 a3=0 items=0 ppid=1 pid=5461 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.533550 systemd[1]: Started session-24.scope. May 15 10:40:07.534146 systemd-logind[1192]: New session 24 of user core. May 15 10:40:07.524000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:07.540365 kernel: audit: type=1327 audit(1747305607.524:1505): proctitle=737368643A20636F7265205B707269765D May 15 10:40:07.540416 kernel: audit: type=1105 audit(1747305607.538:1506): pid=5461 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.538000 audit[5461]: USER_START pid=5461 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.539000 audit[5463]: CRED_ACQ pid=5463 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.548130 kernel: audit: type=1103 audit(1747305607.539:1507): pid=5463 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.145502 sshd[5461]: pam_unix(sshd:session): session closed for user core May 15 10:40:08.145000 audit[5461]: USER_END pid=5461 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.148421 systemd[1]: sshd@23-10.0.0.44:22-10.0.0.1:47528.service: Deactivated successfully. May 15 10:40:08.149431 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:40:08.150532 systemd-logind[1192]: Session 24 logged out. Waiting for processes to exit. May 15 10:40:08.145000 audit[5461]: CRED_DISP pid=5461 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.151338 systemd-logind[1192]: Removed session 24. May 15 10:40:08.156174 kernel: audit: type=1106 audit(1747305608.145:1508): pid=5461 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.156228 kernel: audit: type=1104 audit(1747305608.145:1509): pid=5461 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:08.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.44:22-10.0.0.1:47528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:08.274165 env[1202]: time="2025-05-15T10:40:08.274064303Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.282183 env[1202]: time="2025-05-15T10:40:08.282148366Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.284767 env[1202]: time="2025-05-15T10:40:08.284716270Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.286765 env[1202]: time="2025-05-15T10:40:08.286708504Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.287347 env[1202]: time="2025-05-15T10:40:08.287306186Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:40:08.288537 env[1202]: time="2025-05-15T10:40:08.288504054Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:40:08.289928 env[1202]: time="2025-05-15T10:40:08.289882075Z" level=info msg="CreateContainer within sandbox \"8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:40:08.305244 env[1202]: time="2025-05-15T10:40:08.305184350Z" level=info msg="CreateContainer within sandbox \"8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"62362b6e7e5841e8dde33a3e138c993d3f4366947fb2ec217f53ea3373ed1cb9\"" May 15 10:40:08.305928 env[1202]: time="2025-05-15T10:40:08.305882142Z" level=info msg="StartContainer for \"62362b6e7e5841e8dde33a3e138c993d3f4366947fb2ec217f53ea3373ed1cb9\"" May 15 10:40:08.328248 systemd[1]: Started cri-containerd-62362b6e7e5841e8dde33a3e138c993d3f4366947fb2ec217f53ea3373ed1cb9.scope. May 15 10:40:08.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.340000 audit: BPF prog-id=219 op=LOAD May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5175 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333632623665376535383431653864646533336133653133386339 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5175 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333632623665376535383431653864646533336133653133386339 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit: BPF prog-id=220 op=LOAD May 15 10:40:08.341000 audit[5480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000098ab0 items=0 ppid=5175 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333632623665376535383431653864646533336133653133386339 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit: BPF prog-id=221 op=LOAD May 15 10:40:08.341000 audit[5480]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000098af8 items=0 ppid=5175 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333632623665376535383431653864646533336133653133386339 May 15 10:40:08.341000 audit: BPF prog-id=221 op=UNLOAD May 15 10:40:08.341000 audit: BPF prog-id=220 op=UNLOAD May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { perfmon } for pid=5480 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit[5480]: AVC avc: denied { bpf } for pid=5480 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:08.341000 audit: BPF prog-id=222 op=LOAD May 15 10:40:08.341000 audit[5480]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000098f08 items=0 ppid=5175 pid=5480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.341000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632333632623665376535383431653864646533336133653133386339 May 15 10:40:08.368523 env[1202]: time="2025-05-15T10:40:08.368471518Z" level=info msg="StartContainer for \"62362b6e7e5841e8dde33a3e138c993d3f4366947fb2ec217f53ea3373ed1cb9\" returns successfully" May 15 10:40:08.986560 env[1202]: time="2025-05-15T10:40:08.986519851Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.988661 env[1202]: time="2025-05-15T10:40:08.988608518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.990008 env[1202]: time="2025-05-15T10:40:08.989984003Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.991391 env[1202]: time="2025-05-15T10:40:08.991367183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:08.991921 env[1202]: time="2025-05-15T10:40:08.991866108Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:40:08.993830 env[1202]: time="2025-05-15T10:40:08.993798789Z" level=info msg="CreateContainer within sandbox \"0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:40:09.006266 env[1202]: time="2025-05-15T10:40:09.006207381Z" level=info msg="CreateContainer within sandbox \"0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"3e002bdeeddb1dc87d4638d2b12c31b5dc0b1df145d60197553b98deac1a0a57\"" May 15 10:40:09.007144 env[1202]: time="2025-05-15T10:40:09.007111945Z" level=info msg="StartContainer for \"3e002bdeeddb1dc87d4638d2b12c31b5dc0b1df145d60197553b98deac1a0a57\"" May 15 10:40:09.022872 systemd[1]: Started cri-containerd-3e002bdeeddb1dc87d4638d2b12c31b5dc0b1df145d60197553b98deac1a0a57.scope. May 15 10:40:09.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit: BPF prog-id=223 op=LOAD May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=5291 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303032626465656464623164633837643436333864326231326333 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=5291 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303032626465656464623164633837643436333864326231326333 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit: BPF prog-id=224 op=LOAD May 15 10:40:09.035000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002272a0 items=0 ppid=5291 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303032626465656464623164633837643436333864326231326333 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit: BPF prog-id=225 op=LOAD May 15 10:40:09.035000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002272e8 items=0 ppid=5291 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303032626465656464623164633837643436333864326231326333 May 15 10:40:09.035000 audit: BPF prog-id=225 op=UNLOAD May 15 10:40:09.035000 audit: BPF prog-id=224 op=UNLOAD May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { perfmon } for pid=5520 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit[5520]: AVC avc: denied { bpf } for pid=5520 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.035000 audit: BPF prog-id=226 op=LOAD May 15 10:40:09.035000 audit[5520]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002276f8 items=0 ppid=5291 pid=5520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365303032626465656464623164633837643436333864326231326333 May 15 10:40:09.102239 env[1202]: time="2025-05-15T10:40:09.102173919Z" level=info msg="StartContainer for \"3e002bdeeddb1dc87d4638d2b12c31b5dc0b1df145d60197553b98deac1a0a57\" returns successfully" May 15 10:40:09.211000 audit[5491]: AVC avc: denied { watch } for pid=5491 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_39_04.3030633257/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c541,c999 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c541,c999 tclass=file permissive=0 May 15 10:40:09.211000 audit[5491]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001494260 a2=fc6 a3=0 items=0 ppid=5175 pid=5491 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c541,c999 key=(null) May 15 10:40:09.211000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:40:09.352433 kubelet[2038]: I0515 10:40:09.352267 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-57f7ddb74b-fxxpk" podStartSLOduration=74.280366915 podStartE2EDuration="1m23.352244386s" podCreationTimestamp="2025-05-15 10:38:46 +0000 UTC" firstStartedPulling="2025-05-15 10:39:59.216493472 +0000 UTC m=+94.329754115" lastFinishedPulling="2025-05-15 10:40:08.288370943 +0000 UTC m=+103.401631586" observedRunningTime="2025-05-15 10:40:09.35178174 +0000 UTC m=+104.465042393" watchObservedRunningTime="2025-05-15 10:40:09.352244386 +0000 UTC m=+104.465505029" May 15 10:40:09.352893 kubelet[2038]: I0515 10:40:09.352765 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-pgdpk" podStartSLOduration=75.842819115 podStartE2EDuration="1m22.352759621s" podCreationTimestamp="2025-05-15 10:38:47 +0000 UTC" firstStartedPulling="2025-05-15 10:39:57.225548088 +0000 UTC m=+92.338808731" lastFinishedPulling="2025-05-15 10:40:03.735488594 +0000 UTC m=+98.848749237" observedRunningTime="2025-05-15 10:40:04.33267652 +0000 UTC m=+99.445937163" watchObservedRunningTime="2025-05-15 10:40:09.352759621 +0000 UTC m=+104.466020264" May 15 10:40:09.364000 audit[5553]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.364000 audit[5553]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fffd8217ff0 a2=0 a3=7fffd8217fdc items=0 ppid=2237 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:09.377000 audit[5553]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=5553 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.377000 audit[5553]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffd8217ff0 a2=0 a3=7fffd8217fdc items=0 ppid=2237 pid=5553 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:09.390000 audit[5555]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=5555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.390000 audit[5555]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd34ee7eb0 a2=0 a3=7ffd34ee7e9c items=0 ppid=2237 pid=5555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.390000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:09.395797 kubelet[2038]: I0515 10:40:09.395745 2038 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-57f7ddb74b-w96td" podStartSLOduration=75.74064136 podStartE2EDuration="1m23.395726511s" podCreationTimestamp="2025-05-15 10:38:46 +0000 UTC" firstStartedPulling="2025-05-15 10:40:01.337557808 +0000 UTC m=+96.450818451" lastFinishedPulling="2025-05-15 10:40:08.992642969 +0000 UTC m=+104.105903602" observedRunningTime="2025-05-15 10:40:09.363600762 +0000 UTC m=+104.476861415" watchObservedRunningTime="2025-05-15 10:40:09.395726511 +0000 UTC m=+104.508987154" May 15 10:40:09.397000 audit[5555]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=5555 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:09.397000 audit[5555]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd34ee7eb0 a2=0 a3=7ffd34ee7e9c items=0 ppid=2237 pid=5555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.397000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:09.711000 audit[5531]: AVC avc: denied { watch } for pid=5531 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_39_04.2610160784/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c467,c974 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c467,c974 tclass=file permissive=0 May 15 10:40:09.711000 audit[5531]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c00103c200 a2=fc6 a3=0 items=0 ppid=5291 pid=5531 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c467,c974 key=(null) May 15 10:40:09.711000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:40:10.409000 audit[5557]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=5557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.409000 audit[5557]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff9afd09f0 a2=0 a3=7fff9afd09dc items=0 ppid=2237 pid=5557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.409000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:10.419000 audit[5557]: NETFILTER_CFG table=nat:120 family=2 entries=31 op=nft_register_chain pid=5557 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:10.419000 audit[5557]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff9afd09f0 a2=0 a3=7fff9afd09dc items=0 ppid=2237 pid=5557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:10.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:13.150571 systemd[1]: Started sshd@24-10.0.0.44:22-10.0.0.1:47212.service. May 15 10:40:13.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.44:22-10.0.0.1:47212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:13.151981 kernel: kauditd_printk_skb: 139 callbacks suppressed May 15 10:40:13.152045 kernel: audit: type=1130 audit(1747305613.149:1555): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.44:22-10.0.0.1:47212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:13.186000 audit[5569]: USER_ACCT pid=5569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.187516 sshd[5569]: Accepted publickey for core from 10.0.0.1 port 47212 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:13.190141 sshd[5569]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:13.188000 audit[5569]: CRED_ACQ pid=5569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.193725 systemd-logind[1192]: New session 25 of user core. May 15 10:40:13.194488 systemd[1]: Started session-25.scope. May 15 10:40:13.194856 kernel: audit: type=1101 audit(1747305613.186:1556): pid=5569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.194915 kernel: audit: type=1103 audit(1747305613.188:1557): pid=5569 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.194935 kernel: audit: type=1006 audit(1747305613.188:1558): pid=5569 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 15 10:40:13.197108 kernel: audit: type=1300 audit(1747305613.188:1558): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5ee63820 a2=3 a3=0 items=0 ppid=1 pid=5569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.188000 audit[5569]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5ee63820 a2=3 a3=0 items=0 ppid=1 pid=5569 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.188000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:13.202361 kernel: audit: type=1327 audit(1747305613.188:1558): proctitle=737368643A20636F7265205B707269765D May 15 10:40:13.202391 kernel: audit: type=1105 audit(1747305613.197:1559): pid=5569 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.197000 audit[5569]: USER_START pid=5569 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.206575 kernel: audit: type=1103 audit(1747305613.198:1560): pid=5571 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.198000 audit[5571]: CRED_ACQ pid=5571 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.367815 sshd[5569]: pam_unix(sshd:session): session closed for user core May 15 10:40:13.368000 audit[5569]: USER_END pid=5569 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.371211 systemd[1]: Started sshd@25-10.0.0.44:22-10.0.0.1:47218.service. May 15 10:40:13.371622 systemd[1]: sshd@24-10.0.0.44:22-10.0.0.1:47212.service: Deactivated successfully. May 15 10:40:13.372533 systemd[1]: session-25.scope: Deactivated successfully. May 15 10:40:13.373293 systemd-logind[1192]: Session 25 logged out. Waiting for processes to exit. May 15 10:40:13.374199 systemd-logind[1192]: Removed session 25. May 15 10:40:13.368000 audit[5569]: CRED_DISP pid=5569 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.378369 kernel: audit: type=1106 audit(1747305613.368:1561): pid=5569 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.378468 kernel: audit: type=1104 audit(1747305613.368:1562): pid=5569 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.44:22-10.0.0.1:47218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:13.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.44:22-10.0.0.1:47212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:13.402000 audit[5581]: USER_ACCT pid=5581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.403000 audit[5581]: CRED_ACQ pid=5581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.403000 audit[5581]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff298e8ac0 a2=3 a3=0 items=0 ppid=1 pid=5581 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:13.403000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:13.406075 sshd[5581]: Accepted publickey for core from 10.0.0.1 port 47218 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:13.405209 sshd[5581]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:13.408853 systemd-logind[1192]: New session 26 of user core. May 15 10:40:13.409821 systemd[1]: Started session-26.scope. May 15 10:40:13.412000 audit[5581]: USER_START pid=5581 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.414000 audit[5584]: CRED_ACQ pid=5584 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:14.001478 sshd[5581]: pam_unix(sshd:session): session closed for user core May 15 10:40:14.001000 audit[5581]: USER_END pid=5581 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:14.001000 audit[5581]: CRED_DISP pid=5581 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:14.004911 systemd[1]: Started sshd@26-10.0.0.44:22-10.0.0.1:47230.service. May 15 10:40:14.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.44:22-10.0.0.1:47230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:14.005350 systemd[1]: sshd@25-10.0.0.44:22-10.0.0.1:47218.service: Deactivated successfully. May 15 10:40:14.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.44:22-10.0.0.1:47218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:14.005906 systemd[1]: session-26.scope: Deactivated successfully. May 15 10:40:14.006496 systemd-logind[1192]: Session 26 logged out. Waiting for processes to exit. May 15 10:40:14.007280 systemd-logind[1192]: Removed session 26. May 15 10:40:14.039000 audit[5592]: USER_ACCT pid=5592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:14.040606 sshd[5592]: Accepted publickey for core from 10.0.0.1 port 47230 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:14.039000 audit[5592]: CRED_ACQ pid=5592 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:14.039000 audit[5592]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1951d4b0 a2=3 a3=0 items=0 ppid=1 pid=5592 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:14.039000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:14.041324 sshd[5592]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:14.044231 systemd-logind[1192]: New session 27 of user core. May 15 10:40:14.045038 systemd[1]: Started session-27.scope. May 15 10:40:14.047000 audit[5592]: USER_START pid=5592 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:14.048000 audit[5595]: CRED_ACQ pid=5595 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:15.788000 audit[5606]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=5606 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.788000 audit[5606]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fff3b653090 a2=0 a3=7fff3b65307c items=0 ppid=2237 pid=5606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.793000 audit[5606]: NETFILTER_CFG table=nat:122 family=2 entries=22 op=nft_register_rule pid=5606 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.793000 audit[5606]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fff3b653090 a2=0 a3=0 items=0 ppid=2237 pid=5606 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.793000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.802998 sshd[5592]: pam_unix(sshd:session): session closed for user core May 15 10:40:15.803000 audit[5592]: USER_END pid=5592 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:15.803000 audit[5592]: CRED_DISP pid=5592 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:15.805292 systemd[1]: sshd@26-10.0.0.44:22-10.0.0.1:47230.service: Deactivated successfully. May 15 10:40:15.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.44:22-10.0.0.1:47230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:15.805793 systemd[1]: session-27.scope: Deactivated successfully. May 15 10:40:15.806357 systemd-logind[1192]: Session 27 logged out. Waiting for processes to exit. May 15 10:40:15.807869 systemd[1]: Started sshd@27-10.0.0.44:22-10.0.0.1:47232.service. May 15 10:40:15.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.44:22-10.0.0.1:47232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:15.809055 systemd-logind[1192]: Removed session 27. May 15 10:40:15.813000 audit[5611]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=5611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.813000 audit[5611]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc092fd430 a2=0 a3=7ffc092fd41c items=0 ppid=2237 pid=5611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.813000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.818000 audit[5611]: NETFILTER_CFG table=nat:124 family=2 entries=22 op=nft_register_rule pid=5611 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.818000 audit[5611]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc092fd430 a2=0 a3=0 items=0 ppid=2237 pid=5611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.842000 audit[5609]: USER_ACCT pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:15.843597 sshd[5609]: Accepted publickey for core from 10.0.0.1 port 47232 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:15.843000 audit[5609]: CRED_ACQ pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:15.843000 audit[5609]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe598a1d70 a2=3 a3=0 items=0 ppid=1 pid=5609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.843000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:15.844612 sshd[5609]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:15.847924 systemd-logind[1192]: New session 28 of user core. May 15 10:40:15.848689 systemd[1]: Started session-28.scope. May 15 10:40:15.851000 audit[5609]: USER_START pid=5609 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:15.852000 audit[5613]: CRED_ACQ pid=5613 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.136441 sshd[5609]: pam_unix(sshd:session): session closed for user core May 15 10:40:16.136000 audit[5609]: USER_END pid=5609 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.136000 audit[5609]: CRED_DISP pid=5609 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.140639 systemd[1]: Started sshd@28-10.0.0.44:22-10.0.0.1:47240.service. May 15 10:40:16.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.44:22-10.0.0.1:47240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:16.141261 systemd[1]: sshd@27-10.0.0.44:22-10.0.0.1:47232.service: Deactivated successfully. May 15 10:40:16.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.44:22-10.0.0.1:47232 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:16.142227 systemd[1]: session-28.scope: Deactivated successfully. May 15 10:40:16.142846 systemd-logind[1192]: Session 28 logged out. Waiting for processes to exit. May 15 10:40:16.144767 systemd-logind[1192]: Removed session 28. May 15 10:40:16.175000 audit[5622]: USER_ACCT pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.176969 sshd[5622]: Accepted publickey for core from 10.0.0.1 port 47240 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:16.177000 audit[5622]: CRED_ACQ pid=5622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.177000 audit[5622]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee268d670 a2=3 a3=0 items=0 ppid=1 pid=5622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:16.177000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:16.178683 sshd[5622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:16.183324 systemd[1]: Started session-29.scope. May 15 10:40:16.183616 systemd-logind[1192]: New session 29 of user core. May 15 10:40:16.187000 audit[5622]: USER_START pid=5622 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.188000 audit[5628]: CRED_ACQ pid=5628 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.363608 sshd[5622]: pam_unix(sshd:session): session closed for user core May 15 10:40:16.363000 audit[5622]: USER_END pid=5622 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.363000 audit[5622]: CRED_DISP pid=5622 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:16.365606 systemd[1]: sshd@28-10.0.0.44:22-10.0.0.1:47240.service: Deactivated successfully. May 15 10:40:16.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.44:22-10.0.0.1:47240 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:16.366394 systemd[1]: session-29.scope: Deactivated successfully. May 15 10:40:16.367264 systemd-logind[1192]: Session 29 logged out. Waiting for processes to exit. May 15 10:40:16.368026 systemd-logind[1192]: Removed session 29. May 15 10:40:17.884632 kubelet[2038]: E0515 10:40:17.884592 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:21.368597 systemd[1]: Started sshd@29-10.0.0.44:22-10.0.0.1:55556.service. May 15 10:40:21.367000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.44:22-10.0.0.1:55556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:21.373961 kernel: kauditd_printk_skb: 57 callbacks suppressed May 15 10:40:21.374022 kernel: audit: type=1130 audit(1747305621.367:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.44:22-10.0.0.1:55556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:21.382538 kernel: audit: type=1325 audit(1747305621.369:1605): table=filter:125 family=2 entries=20 op=nft_register_rule pid=5665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:21.382641 kernel: audit: type=1300 audit(1747305621.369:1605): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff372fdb40 a2=0 a3=7fff372fdb2c items=0 ppid=2237 pid=5665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.382668 kernel: audit: type=1327 audit(1747305621.369:1605): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:21.369000 audit[5665]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=5665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:21.369000 audit[5665]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff372fdb40 a2=0 a3=7fff372fdb2c items=0 ppid=2237 pid=5665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.369000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:21.386000 audit[5665]: NETFILTER_CFG table=nat:126 family=2 entries=106 op=nft_register_chain pid=5665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:21.386000 audit[5665]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff372fdb40 a2=0 a3=7fff372fdb2c items=0 ppid=2237 pid=5665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.396689 kernel: audit: type=1325 audit(1747305621.386:1606): table=nat:126 family=2 entries=106 op=nft_register_chain pid=5665 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:21.396757 kernel: audit: type=1300 audit(1747305621.386:1606): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fff372fdb40 a2=0 a3=7fff372fdb2c items=0 ppid=2237 pid=5665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.397835 kernel: audit: type=1327 audit(1747305621.386:1606): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:21.386000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:21.409000 audit[5664]: USER_ACCT pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:21.410992 sshd[5664]: Accepted publickey for core from 10.0.0.1 port 55556 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:21.411861 sshd[5664]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:21.415124 kernel: audit: type=1101 audit(1747305621.409:1607): pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:21.415189 kernel: audit: type=1103 audit(1747305621.409:1608): pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:21.409000 audit[5664]: CRED_ACQ pid=5664 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:21.415946 systemd-logind[1192]: New session 30 of user core. May 15 10:40:21.416619 systemd[1]: Started session-30.scope. May 15 10:40:21.422083 kernel: audit: type=1006 audit(1747305621.409:1609): pid=5664 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 May 15 10:40:21.409000 audit[5664]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe68b4a400 a2=3 a3=0 items=0 ppid=1 pid=5664 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:21.409000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:21.422000 audit[5664]: USER_START pid=5664 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:21.423000 audit[5668]: CRED_ACQ pid=5668 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:21.528155 sshd[5664]: pam_unix(sshd:session): session closed for user core May 15 10:40:21.527000 audit[5664]: USER_END pid=5664 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:21.527000 audit[5664]: CRED_DISP pid=5664 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:21.530201 systemd[1]: sshd@29-10.0.0.44:22-10.0.0.1:55556.service: Deactivated successfully. May 15 10:40:21.529000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.44:22-10.0.0.1:55556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:21.530918 systemd[1]: session-30.scope: Deactivated successfully. May 15 10:40:21.531366 systemd-logind[1192]: Session 30 logged out. Waiting for processes to exit. May 15 10:40:21.531967 systemd-logind[1192]: Removed session 30. May 15 10:40:21.930000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:21.930000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:21.930000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0034c1de0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:40:21.930000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ec7470 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:40:21.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:21.930000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:22.428000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:22.428000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520974 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:22.428000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:22.428000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=79 a1=c010253260 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:40:22.428000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c0165423c0 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:40:22.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:22.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:22.428000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c016775080 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:40:22.428000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:22.429000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:22.429000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c0102a27c0 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:40:22.429000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:22.429000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520980 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:22.429000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=77 a1=c016359ce0 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:40:22.429000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:22.429000 audit[1905]: AVC avc: denied { watch } for pid=1905 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:22.429000 audit[1905]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=63 a1=c016a3a630 a2=fc6 a3=0 items=0 ppid=1742 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c368,c723 key=(null) May 15 10:40:22.429000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3434002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:24.979508 env[1202]: time="2025-05-15T10:40:24.979466146Z" level=info msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.031 [WARNING][5698] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--pgdpk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eef1f6f4-36a9-4963-8ebe-9f756661b798", ResourceVersion:"1223", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef", Pod:"csi-node-driver-pgdpk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib638371c06f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.031 [INFO][5698] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.031 [INFO][5698] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" iface="eth0" netns="" May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.031 [INFO][5698] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.031 [INFO][5698] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.053 [INFO][5707] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.053 [INFO][5707] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.053 [INFO][5707] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.058 [WARNING][5707] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.058 [INFO][5707] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.059 [INFO][5707] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.063196 env[1202]: 2025-05-15 10:40:25.061 [INFO][5698] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:40:25.063666 env[1202]: time="2025-05-15T10:40:25.063228956Z" level=info msg="TearDown network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" successfully" May 15 10:40:25.063666 env[1202]: time="2025-05-15T10:40:25.063270014Z" level=info msg="StopPodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" returns successfully" May 15 10:40:25.066110 env[1202]: time="2025-05-15T10:40:25.066041919Z" level=info msg="RemovePodSandbox for \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" May 15 10:40:25.066110 env[1202]: time="2025-05-15T10:40:25.066085902Z" level=info msg="Forcibly stopping sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\"" May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.101 [WARNING][5728] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--pgdpk-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eef1f6f4-36a9-4963-8ebe-9f756661b798", ResourceVersion:"1223", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b7b4b9d", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5b7edd765b11053b73d052334cb3833d131d77a48be0a23a6ed1dbf09e576bef", Pod:"csi-node-driver-pgdpk", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calib638371c06f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.102 [INFO][5728] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.102 [INFO][5728] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" iface="eth0" netns="" May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.102 [INFO][5728] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.102 [INFO][5728] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.179 [INFO][5736] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.179 [INFO][5736] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.179 [INFO][5736] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.185 [WARNING][5736] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.185 [INFO][5736] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" HandleID="k8s-pod-network.5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" Workload="localhost-k8s-csi--node--driver--pgdpk-eth0" May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.187 [INFO][5736] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.191013 env[1202]: 2025-05-15 10:40:25.189 [INFO][5728] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc" May 15 10:40:25.191673 env[1202]: time="2025-05-15T10:40:25.191046157Z" level=info msg="TearDown network for sandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" successfully" May 15 10:40:25.196463 env[1202]: time="2025-05-15T10:40:25.196418725Z" level=info msg="RemovePodSandbox \"5aa89e408fa8fe59d0b890258bee83f7c60189ffe2b87000f30b28b8da6dd8cc\" returns successfully" May 15 10:40:25.197037 env[1202]: time="2025-05-15T10:40:25.197006886Z" level=info msg="StopPodSandbox for \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\"" May 15 10:40:25.197177 env[1202]: time="2025-05-15T10:40:25.197135068Z" level=info msg="TearDown network for sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" successfully" May 15 10:40:25.197177 env[1202]: time="2025-05-15T10:40:25.197173120Z" level=info msg="StopPodSandbox for \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" returns successfully" May 15 10:40:25.197410 env[1202]: time="2025-05-15T10:40:25.197385982Z" level=info msg="RemovePodSandbox for \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\"" May 15 10:40:25.197458 env[1202]: time="2025-05-15T10:40:25.197405539Z" level=info msg="Forcibly stopping sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\"" May 15 10:40:25.197458 env[1202]: time="2025-05-15T10:40:25.197451596Z" level=info msg="TearDown network for sandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" successfully" May 15 10:40:25.201049 env[1202]: time="2025-05-15T10:40:25.201019945Z" level=info msg="RemovePodSandbox \"344615baa64e20d39ab7037a26cf6f1addcaf71cc45527c99322251523cd42cd\" returns successfully" May 15 10:40:25.201299 env[1202]: time="2025-05-15T10:40:25.201278995Z" level=info msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.232 [WARNING][5761] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0", GenerateName:"calico-apiserver-57f7ddb74b-", Namespace:"calico-apiserver", SelfLink:"", UID:"af843951-e0be-4fdf-bf7c-7b61c7a66c0c", ResourceVersion:"1254", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f7ddb74b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d", Pod:"calico-apiserver-57f7ddb74b-fxxpk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif768e5dce5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.233 [INFO][5761] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.233 [INFO][5761] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" iface="eth0" netns="" May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.233 [INFO][5761] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.233 [INFO][5761] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.255 [INFO][5769] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.255 [INFO][5769] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.256 [INFO][5769] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.261 [WARNING][5769] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.261 [INFO][5769] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.262 [INFO][5769] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.265593 env[1202]: 2025-05-15 10:40:25.263 [INFO][5761] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:40:25.265593 env[1202]: time="2025-05-15T10:40:25.265545867Z" level=info msg="TearDown network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" successfully" May 15 10:40:25.265593 env[1202]: time="2025-05-15T10:40:25.265570243Z" level=info msg="StopPodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" returns successfully" May 15 10:40:25.266865 env[1202]: time="2025-05-15T10:40:25.266828099Z" level=info msg="RemovePodSandbox for \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" May 15 10:40:25.266948 env[1202]: time="2025-05-15T10:40:25.266864808Z" level=info msg="Forcibly stopping sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\"" May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.295 [WARNING][5792] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0", GenerateName:"calico-apiserver-57f7ddb74b-", Namespace:"calico-apiserver", SelfLink:"", UID:"af843951-e0be-4fdf-bf7c-7b61c7a66c0c", ResourceVersion:"1254", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f7ddb74b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8c19187708ad39ebe46fcb19aec0da068bbc543babc97294a41c41d809a21a2d", Pod:"calico-apiserver-57f7ddb74b-fxxpk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif768e5dce5c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.295 [INFO][5792] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.295 [INFO][5792] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" iface="eth0" netns="" May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.295 [INFO][5792] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.295 [INFO][5792] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.312 [INFO][5801] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.312 [INFO][5801] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.313 [INFO][5801] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.318 [WARNING][5801] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.318 [INFO][5801] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" HandleID="k8s-pod-network.e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--fxxpk-eth0" May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.319 [INFO][5801] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.322229 env[1202]: 2025-05-15 10:40:25.320 [INFO][5792] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd" May 15 10:40:25.323189 env[1202]: time="2025-05-15T10:40:25.322259043Z" level=info msg="TearDown network for sandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" successfully" May 15 10:40:25.325782 env[1202]: time="2025-05-15T10:40:25.325753132Z" level=info msg="RemovePodSandbox \"e76965cfd0f3228664da72de059e2f714d55587e4f6dc3cc68b10323eda288cd\" returns successfully" May 15 10:40:25.326231 env[1202]: time="2025-05-15T10:40:25.326207680Z" level=info msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.357 [WARNING][5823] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0", GenerateName:"calico-apiserver-57f7ddb74b-", Namespace:"calico-apiserver", SelfLink:"", UID:"38e13e26-0f53-4fa0-b34d-bef637b8c73d", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f7ddb74b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66", Pod:"calico-apiserver-57f7ddb74b-w96td", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3d70f89818b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.357 [INFO][5823] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.357 [INFO][5823] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" iface="eth0" netns="" May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.357 [INFO][5823] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.357 [INFO][5823] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.377 [INFO][5831] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.377 [INFO][5831] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.377 [INFO][5831] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.383 [WARNING][5831] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.383 [INFO][5831] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.384 [INFO][5831] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.387038 env[1202]: 2025-05-15 10:40:25.385 [INFO][5823] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:25.387602 env[1202]: time="2025-05-15T10:40:25.387068770Z" level=info msg="TearDown network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" successfully" May 15 10:40:25.387602 env[1202]: time="2025-05-15T10:40:25.387120839Z" level=info msg="StopPodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" returns successfully" May 15 10:40:25.387602 env[1202]: time="2025-05-15T10:40:25.387569426Z" level=info msg="RemovePodSandbox for \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" May 15 10:40:25.387679 env[1202]: time="2025-05-15T10:40:25.387595695Z" level=info msg="Forcibly stopping sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\"" May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.418 [WARNING][5854] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0", GenerateName:"calico-apiserver-57f7ddb74b-", Namespace:"calico-apiserver", SelfLink:"", UID:"38e13e26-0f53-4fa0-b34d-bef637b8c73d", ResourceVersion:"1262", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 46, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"57f7ddb74b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"0da2d359fe0aae5f74dd709db292cb186a76d875438daad9fb83906c05f4ac66", Pod:"calico-apiserver-57f7ddb74b-w96td", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali3d70f89818b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.418 [INFO][5854] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.418 [INFO][5854] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" iface="eth0" netns="" May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.418 [INFO][5854] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.418 [INFO][5854] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.438 [INFO][5862] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.438 [INFO][5862] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.438 [INFO][5862] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.443 [WARNING][5862] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.443 [INFO][5862] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" HandleID="k8s-pod-network.cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" Workload="localhost-k8s-calico--apiserver--57f7ddb74b--w96td-eth0" May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.444 [INFO][5862] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.446994 env[1202]: 2025-05-15 10:40:25.445 [INFO][5854] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35" May 15 10:40:25.447531 env[1202]: time="2025-05-15T10:40:25.447022727Z" level=info msg="TearDown network for sandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" successfully" May 15 10:40:25.450411 env[1202]: time="2025-05-15T10:40:25.450374859Z" level=info msg="RemovePodSandbox \"cea69f66a146a13a8d7b19c0c87f13a192ddda90f091bc122f857bf36591ad35\" returns successfully" May 15 10:40:25.450860 env[1202]: time="2025-05-15T10:40:25.450824797Z" level=info msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.478 [WARNING][5884] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--km746-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d599ad29-ab1c-4f94-a799-31f081a7cdec", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938", Pod:"coredns-7db6d8ff4d-km746", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0f3c152c0b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.478 [INFO][5884] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.478 [INFO][5884] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" iface="eth0" netns="" May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.478 [INFO][5884] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.478 [INFO][5884] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.498 [INFO][5892] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.498 [INFO][5892] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.498 [INFO][5892] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.503 [WARNING][5892] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.503 [INFO][5892] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.504 [INFO][5892] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.507055 env[1202]: 2025-05-15 10:40:25.505 [INFO][5884] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:40:25.507505 env[1202]: time="2025-05-15T10:40:25.507082684Z" level=info msg="TearDown network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" successfully" May 15 10:40:25.507505 env[1202]: time="2025-05-15T10:40:25.507142196Z" level=info msg="StopPodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" returns successfully" May 15 10:40:25.507604 env[1202]: time="2025-05-15T10:40:25.507581896Z" level=info msg="RemovePodSandbox for \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" May 15 10:40:25.507652 env[1202]: time="2025-05-15T10:40:25.507613567Z" level=info msg="Forcibly stopping sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\"" May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.536 [WARNING][5915] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--km746-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"d599ad29-ab1c-4f94-a799-31f081a7cdec", ResourceVersion:"1104", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"410dfd7e3d0316c3b36d59360c390a2c46e10e79cb772919eec361e42b0bf938", Pod:"coredns-7db6d8ff4d-km746", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia0f3c152c0b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.536 [INFO][5915] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.536 [INFO][5915] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" iface="eth0" netns="" May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.536 [INFO][5915] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.536 [INFO][5915] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.558 [INFO][5923] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.559 [INFO][5923] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.559 [INFO][5923] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.564 [WARNING][5923] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.564 [INFO][5923] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" HandleID="k8s-pod-network.472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" Workload="localhost-k8s-coredns--7db6d8ff4d--km746-eth0" May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.565 [INFO][5923] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.568006 env[1202]: 2025-05-15 10:40:25.566 [INFO][5915] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0" May 15 10:40:25.568006 env[1202]: time="2025-05-15T10:40:25.567963901Z" level=info msg="TearDown network for sandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" successfully" May 15 10:40:25.572122 env[1202]: time="2025-05-15T10:40:25.572079374Z" level=info msg="RemovePodSandbox \"472937b938e477b25275b50f61f8190df779f855964422b5b8254ae70acdb7d0\" returns successfully" May 15 10:40:25.572583 env[1202]: time="2025-05-15T10:40:25.572545845Z" level=info msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.603 [WARNING][5945] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"977383d6-9b09-4182-9d9f-aa8e054ab44e", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e", Pod:"coredns-7db6d8ff4d-d5ptl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid6111490877", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.603 [INFO][5945] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.603 [INFO][5945] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" iface="eth0" netns="" May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.603 [INFO][5945] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.603 [INFO][5945] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.624 [INFO][5954] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.624 [INFO][5954] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.624 [INFO][5954] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.630 [WARNING][5954] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.630 [INFO][5954] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.631 [INFO][5954] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.635384 env[1202]: 2025-05-15 10:40:25.634 [INFO][5945] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:40:25.636141 env[1202]: time="2025-05-15T10:40:25.635418124Z" level=info msg="TearDown network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" successfully" May 15 10:40:25.636141 env[1202]: time="2025-05-15T10:40:25.635465954Z" level=info msg="StopPodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" returns successfully" May 15 10:40:25.636141 env[1202]: time="2025-05-15T10:40:25.635973172Z" level=info msg="RemovePodSandbox for \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" May 15 10:40:25.636141 env[1202]: time="2025-05-15T10:40:25.636002738Z" level=info msg="Forcibly stopping sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\"" May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.670 [WARNING][5978] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0", GenerateName:"coredns-7db6d8ff4d-", Namespace:"kube-system", SelfLink:"", UID:"977383d6-9b09-4182-9d9f-aa8e054ab44e", ResourceVersion:"1134", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"7db6d8ff4d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"4006d05f97c4a70172e1cc52c9546e6e734b1a330c0ac82d15dedbf298c3fa7e", Pod:"coredns-7db6d8ff4d-d5ptl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calid6111490877", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.670 [INFO][5978] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.670 [INFO][5978] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" iface="eth0" netns="" May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.670 [INFO][5978] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.670 [INFO][5978] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.687 [INFO][5986] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.687 [INFO][5986] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.687 [INFO][5986] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.692 [WARNING][5986] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.692 [INFO][5986] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" HandleID="k8s-pod-network.38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" Workload="localhost-k8s-coredns--7db6d8ff4d--d5ptl-eth0" May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.693 [INFO][5986] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.695526 env[1202]: 2025-05-15 10:40:25.694 [INFO][5978] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f" May 15 10:40:25.696259 env[1202]: time="2025-05-15T10:40:25.695553283Z" level=info msg="TearDown network for sandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" successfully" May 15 10:40:25.698808 env[1202]: time="2025-05-15T10:40:25.698781971Z" level=info msg="RemovePodSandbox \"38aa8c1d0717d42200f941d9503790cfb2c84ee9700227b4f4888d270e88611f\" returns successfully" May 15 10:40:25.699365 env[1202]: time="2025-05-15T10:40:25.699330257Z" level=info msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.728 [WARNING][6009] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0", GenerateName:"calico-kube-controllers-5b9c694b5b-", Namespace:"calico-system", SelfLink:"", UID:"a549a8f9-4c84-43d4-aeaf-975efd7251f9", ResourceVersion:"1203", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b9c694b5b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5", Pod:"calico-kube-controllers-5b9c694b5b-s5dhd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaac4e9160c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.729 [INFO][6009] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.729 [INFO][6009] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" iface="eth0" netns="" May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.729 [INFO][6009] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.729 [INFO][6009] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.747 [INFO][6017] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.747 [INFO][6017] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.747 [INFO][6017] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.752 [WARNING][6017] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.752 [INFO][6017] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.753 [INFO][6017] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.756217 env[1202]: 2025-05-15 10:40:25.754 [INFO][6009] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:40:25.756661 env[1202]: time="2025-05-15T10:40:25.756245875Z" level=info msg="TearDown network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" successfully" May 15 10:40:25.756661 env[1202]: time="2025-05-15T10:40:25.756273476Z" level=info msg="StopPodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" returns successfully" May 15 10:40:25.756743 env[1202]: time="2025-05-15T10:40:25.756719579Z" level=info msg="RemovePodSandbox for \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" May 15 10:40:25.756791 env[1202]: time="2025-05-15T10:40:25.756753873Z" level=info msg="Forcibly stopping sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\"" May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.782 [WARNING][6040] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0", GenerateName:"calico-kube-controllers-5b9c694b5b-", Namespace:"calico-system", SelfLink:"", UID:"a549a8f9-4c84-43d4-aeaf-975efd7251f9", ResourceVersion:"1203", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 38, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5b9c694b5b", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c75fb9e8e38bdd30441e7cd55eba9d15ac0ec327874be30c800cd82f0ec8eed5", Pod:"calico-kube-controllers-5b9c694b5b-s5dhd", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"caliaac4e9160c9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.782 [INFO][6040] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.782 [INFO][6040] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" iface="eth0" netns="" May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.782 [INFO][6040] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.782 [INFO][6040] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.798 [INFO][6048] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.798 [INFO][6048] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.799 [INFO][6048] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.803 [WARNING][6048] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.803 [INFO][6048] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" HandleID="k8s-pod-network.18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" Workload="localhost-k8s-calico--kube--controllers--5b9c694b5b--s5dhd-eth0" May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.804 [INFO][6048] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:25.807140 env[1202]: 2025-05-15 10:40:25.805 [INFO][6040] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7" May 15 10:40:25.807677 env[1202]: time="2025-05-15T10:40:25.807151240Z" level=info msg="TearDown network for sandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" successfully" May 15 10:40:25.977367 env[1202]: time="2025-05-15T10:40:25.977311045Z" level=info msg="RemovePodSandbox \"18b1711e7e809c610ff06733cfdbef55edd544d2abc7db46a3097a0f44b4cda7\" returns successfully" May 15 10:40:26.532326 systemd[1]: Started sshd@30-10.0.0.44:22-10.0.0.1:55568.service. May 15 10:40:26.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.44:22-10.0.0.1:55568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:26.534321 kernel: kauditd_printk_skb: 31 callbacks suppressed May 15 10:40:26.534374 kernel: audit: type=1130 audit(1747305626.531:1623): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.44:22-10.0.0.1:55568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:26.567000 audit[6057]: USER_ACCT pid=6057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.569247 sshd[6057]: Accepted publickey for core from 10.0.0.1 port 55568 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:26.570219 sshd[6057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:26.568000 audit[6057]: CRED_ACQ pid=6057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.573415 systemd-logind[1192]: New session 31 of user core. May 15 10:40:26.574389 systemd[1]: Started session-31.scope. May 15 10:40:26.576578 kernel: audit: type=1101 audit(1747305626.567:1624): pid=6057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.576626 kernel: audit: type=1103 audit(1747305626.568:1625): pid=6057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.576651 kernel: audit: type=1006 audit(1747305626.568:1626): pid=6057 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 May 15 10:40:26.578897 kernel: audit: type=1300 audit(1747305626.568:1626): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd3ab3e90 a2=3 a3=0 items=0 ppid=1 pid=6057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:26.568000 audit[6057]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd3ab3e90 a2=3 a3=0 items=0 ppid=1 pid=6057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:26.568000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:26.584227 kernel: audit: type=1327 audit(1747305626.568:1626): proctitle=737368643A20636F7265205B707269765D May 15 10:40:26.584267 kernel: audit: type=1105 audit(1747305626.577:1627): pid=6057 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.577000 audit[6057]: USER_START pid=6057 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.578000 audit[6059]: CRED_ACQ pid=6059 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.592081 kernel: audit: type=1103 audit(1747305626.578:1628): pid=6059 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.747892 sshd[6057]: pam_unix(sshd:session): session closed for user core May 15 10:40:26.747000 audit[6057]: USER_END pid=6057 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.749915 systemd[1]: sshd@30-10.0.0.44:22-10.0.0.1:55568.service: Deactivated successfully. May 15 10:40:26.750556 systemd[1]: session-31.scope: Deactivated successfully. May 15 10:40:26.751243 systemd-logind[1192]: Session 31 logged out. Waiting for processes to exit. May 15 10:40:26.751882 systemd-logind[1192]: Removed session 31. May 15 10:40:26.747000 audit[6057]: CRED_DISP pid=6057 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.756462 kernel: audit: type=1106 audit(1747305626.747:1629): pid=6057 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.756515 kernel: audit: type=1104 audit(1747305626.747:1630): pid=6057 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:26.749000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.44:22-10.0.0.1:55568 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:26.972165 kubelet[2038]: E0515 10:40:26.972132 2038 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:31.751663 systemd[1]: Started sshd@31-10.0.0.44:22-10.0.0.1:51926.service. May 15 10:40:31.754123 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:31.754180 kernel: audit: type=1130 audit(1747305631.750:1632): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.44:22-10.0.0.1:51926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:31.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.44:22-10.0.0.1:51926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:31.784000 audit[6077]: USER_ACCT pid=6077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.785505 sshd[6077]: Accepted publickey for core from 10.0.0.1 port 51926 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:31.787496 sshd[6077]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:31.786000 audit[6077]: CRED_ACQ pid=6077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.790709 systemd-logind[1192]: New session 32 of user core. May 15 10:40:31.791423 systemd[1]: Started session-32.scope. May 15 10:40:31.795136 kernel: audit: type=1101 audit(1747305631.784:1633): pid=6077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.795201 kernel: audit: type=1103 audit(1747305631.786:1634): pid=6077 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.795222 kernel: audit: type=1006 audit(1747305631.786:1635): pid=6077 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 May 15 10:40:31.786000 audit[6077]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe973f5b90 a2=3 a3=0 items=0 ppid=1 pid=6077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.802316 kernel: audit: type=1300 audit(1747305631.786:1635): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe973f5b90 a2=3 a3=0 items=0 ppid=1 pid=6077 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.802357 kernel: audit: type=1327 audit(1747305631.786:1635): proctitle=737368643A20636F7265205B707269765D May 15 10:40:31.786000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:31.803761 kernel: audit: type=1105 audit(1747305631.794:1636): pid=6077 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.794000 audit[6077]: USER_START pid=6077 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.808439 kernel: audit: type=1103 audit(1747305631.795:1637): pid=6079 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.795000 audit[6079]: CRED_ACQ pid=6079 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.896828 sshd[6077]: pam_unix(sshd:session): session closed for user core May 15 10:40:31.896000 audit[6077]: USER_END pid=6077 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.899071 systemd[1]: sshd@31-10.0.0.44:22-10.0.0.1:51926.service: Deactivated successfully. May 15 10:40:31.899958 systemd[1]: session-32.scope: Deactivated successfully. May 15 10:40:31.900850 systemd-logind[1192]: Session 32 logged out. Waiting for processes to exit. May 15 10:40:31.901661 systemd-logind[1192]: Removed session 32. May 15 10:40:31.896000 audit[6077]: CRED_DISP pid=6077 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.906333 kernel: audit: type=1106 audit(1747305631.896:1638): pid=6077 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.906380 kernel: audit: type=1104 audit(1747305631.896:1639): pid=6077 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.44:22-10.0.0.1:51926 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:36.902298 systemd[1]: Started sshd@32-10.0.0.44:22-10.0.0.1:51932.service. May 15 10:40:36.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.44:22-10.0.0.1:51932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:36.903686 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:36.903756 kernel: audit: type=1130 audit(1747305636.901:1641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.44:22-10.0.0.1:51932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:36.935000 audit[6109]: USER_ACCT pid=6109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:36.936368 sshd[6109]: Accepted publickey for core from 10.0.0.1 port 51932 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:40:36.938873 sshd[6109]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:36.937000 audit[6109]: CRED_ACQ pid=6109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:36.943321 systemd-logind[1192]: New session 33 of user core. May 15 10:40:36.944437 systemd[1]: Started session-33.scope. May 15 10:40:36.945115 kernel: audit: type=1101 audit(1747305636.935:1642): pid=6109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:36.945176 kernel: audit: type=1103 audit(1747305636.937:1643): pid=6109 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:36.947933 kernel: audit: type=1006 audit(1747305636.937:1644): pid=6109 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 May 15 10:40:36.947990 kernel: audit: type=1300 audit(1747305636.937:1644): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b74c3e0 a2=3 a3=0 items=0 ppid=1 pid=6109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:36.937000 audit[6109]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7b74c3e0 a2=3 a3=0 items=0 ppid=1 pid=6109 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:36.951940 kernel: audit: type=1327 audit(1747305636.937:1644): proctitle=737368643A20636F7265205B707269765D May 15 10:40:36.937000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:36.948000 audit[6109]: USER_START pid=6109 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:36.957434 kernel: audit: type=1105 audit(1747305636.948:1645): pid=6109 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:36.957478 kernel: audit: type=1103 audit(1747305636.950:1646): pid=6111 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:36.950000 audit[6111]: CRED_ACQ pid=6111 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.050523 sshd[6109]: pam_unix(sshd:session): session closed for user core May 15 10:40:37.050000 audit[6109]: USER_END pid=6109 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.053116 systemd[1]: sshd@32-10.0.0.44:22-10.0.0.1:51932.service: Deactivated successfully. May 15 10:40:37.053859 systemd[1]: session-33.scope: Deactivated successfully. May 15 10:40:37.054802 systemd-logind[1192]: Session 33 logged out. Waiting for processes to exit. May 15 10:40:37.055497 systemd-logind[1192]: Removed session 33. May 15 10:40:37.050000 audit[6109]: CRED_DISP pid=6109 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.059498 kernel: audit: type=1106 audit(1747305637.050:1647): pid=6109 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.059562 kernel: audit: type=1104 audit(1747305637.050:1648): pid=6109 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.44:22-10.0.0.1:51932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:37.735000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:37.735000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:37.735000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00053dce0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:40:37.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:37.735000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002da1d60 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:40:37.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:37.735000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:37.735000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c002ee6ae0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:40:37.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:37.735000 audit[1884]: AVC avc: denied { watch } for pid=1884 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:37.735000 audit[1884]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00150dee0 a2=fc6 a3=0 items=0 ppid=1749 pid=1884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c55,c550 key=(null) May 15 10:40:37.735000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269