May 15 10:47:04.847972 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 10:47:04.847992 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:47:04.848000 kernel: BIOS-provided physical RAM map: May 15 10:47:04.848006 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable May 15 10:47:04.848011 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved May 15 10:47:04.848017 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved May 15 10:47:04.848023 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdbfff] usable May 15 10:47:04.848029 kernel: BIOS-e820: [mem 0x000000009cfdc000-0x000000009cffffff] reserved May 15 10:47:04.848036 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:47:04.848041 kernel: BIOS-e820: [mem 0x00000000fed1c000-0x00000000fed1ffff] reserved May 15 10:47:04.848047 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved May 15 10:47:04.848052 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved May 15 10:47:04.848057 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved May 15 10:47:04.848063 kernel: NX (Execute Disable) protection: active May 15 10:47:04.848071 kernel: SMBIOS 2.8 present. May 15 10:47:04.848077 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 May 15 10:47:04.848083 kernel: Hypervisor detected: KVM May 15 10:47:04.848089 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 10:47:04.848095 kernel: kvm-clock: cpu 0, msr 9519a001, primary cpu clock May 15 10:47:04.848101 kernel: kvm-clock: using sched offset of 2459811313 cycles May 15 10:47:04.848107 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 10:47:04.848113 kernel: tsc: Detected 2794.748 MHz processor May 15 10:47:04.848120 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 10:47:04.848127 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 10:47:04.848133 kernel: last_pfn = 0x9cfdc max_arch_pfn = 0x400000000 May 15 10:47:04.848139 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 10:47:04.848146 kernel: Using GB pages for direct mapping May 15 10:47:04.848152 kernel: ACPI: Early table checksum verification disabled May 15 10:47:04.848158 kernel: ACPI: RSDP 0x00000000000F59D0 000014 (v00 BOCHS ) May 15 10:47:04.848164 kernel: ACPI: RSDT 0x000000009CFE2408 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:47:04.848170 kernel: ACPI: FACP 0x000000009CFE21E8 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:47:04.848176 kernel: ACPI: DSDT 0x000000009CFE0040 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:47:04.848183 kernel: ACPI: FACS 0x000000009CFE0000 000040 May 15 10:47:04.848189 kernel: ACPI: APIC 0x000000009CFE22DC 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:47:04.848196 kernel: ACPI: HPET 0x000000009CFE236C 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:47:04.848202 kernel: ACPI: MCFG 0x000000009CFE23A4 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:47:04.848208 kernel: ACPI: WAET 0x000000009CFE23E0 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:47:04.848214 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe21e8-0x9cfe22db] May 15 10:47:04.848220 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe21e7] May 15 10:47:04.848226 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] May 15 10:47:04.848235 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe22dc-0x9cfe236b] May 15 10:47:04.848242 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe236c-0x9cfe23a3] May 15 10:47:04.848248 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cfe23a4-0x9cfe23df] May 15 10:47:04.848255 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe23e0-0x9cfe2407] May 15 10:47:04.848261 kernel: No NUMA configuration found May 15 10:47:04.848268 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdbfff] May 15 10:47:04.848275 kernel: NODE_DATA(0) allocated [mem 0x9cfd6000-0x9cfdbfff] May 15 10:47:04.848282 kernel: Zone ranges: May 15 10:47:04.848288 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 10:47:04.848295 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdbfff] May 15 10:47:04.848301 kernel: Normal empty May 15 10:47:04.848307 kernel: Movable zone start for each node May 15 10:47:04.848314 kernel: Early memory node ranges May 15 10:47:04.848320 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] May 15 10:47:04.848327 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdbfff] May 15 10:47:04.848333 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdbfff] May 15 10:47:04.848341 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:47:04.848347 kernel: On node 0, zone DMA: 97 pages in unavailable ranges May 15 10:47:04.848354 kernel: On node 0, zone DMA32: 12324 pages in unavailable ranges May 15 10:47:04.848361 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 10:47:04.848367 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 10:47:04.848373 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 10:47:04.848380 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 10:47:04.848397 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 10:47:04.848406 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 10:47:04.848416 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 10:47:04.848424 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 10:47:04.848449 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 10:47:04.848457 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 10:47:04.848466 kernel: TSC deadline timer available May 15 10:47:04.848472 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 10:47:04.848479 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 10:47:04.848485 kernel: kvm-guest: setup PV sched yield May 15 10:47:04.848492 kernel: [mem 0xc0000000-0xfed1bfff] available for PCI devices May 15 10:47:04.848500 kernel: Booting paravirtualized kernel on KVM May 15 10:47:04.848507 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 10:47:04.848513 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 10:47:04.848520 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 10:47:04.848526 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 10:47:04.848533 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 10:47:04.848539 kernel: kvm-guest: setup async PF for cpu 0 May 15 10:47:04.848545 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 May 15 10:47:04.848552 kernel: kvm-guest: PV spinlocks enabled May 15 10:47:04.848559 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 10:47:04.848566 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632732 May 15 10:47:04.848572 kernel: Policy zone: DMA32 May 15 10:47:04.848580 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:47:04.848587 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:47:04.848594 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:47:04.848600 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:47:04.848607 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:47:04.848615 kernel: Memory: 2436696K/2571752K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 134796K reserved, 0K cma-reserved) May 15 10:47:04.848622 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:47:04.848628 kernel: ftrace: allocating 34585 entries in 136 pages May 15 10:47:04.848635 kernel: ftrace: allocated 136 pages with 2 groups May 15 10:47:04.848641 kernel: rcu: Hierarchical RCU implementation. May 15 10:47:04.848648 kernel: rcu: RCU event tracing is enabled. May 15 10:47:04.848655 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:47:04.848661 kernel: Rude variant of Tasks RCU enabled. May 15 10:47:04.848668 kernel: Tracing variant of Tasks RCU enabled. May 15 10:47:04.848676 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:47:04.848682 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:47:04.848689 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 10:47:04.848695 kernel: random: crng init done May 15 10:47:04.848702 kernel: Console: colour VGA+ 80x25 May 15 10:47:04.848708 kernel: printk: console [ttyS0] enabled May 15 10:47:04.848715 kernel: ACPI: Core revision 20210730 May 15 10:47:04.848721 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 10:47:04.848727 kernel: APIC: Switch to symmetric I/O mode setup May 15 10:47:04.848735 kernel: x2apic enabled May 15 10:47:04.848742 kernel: Switched APIC routing to physical x2apic. May 15 10:47:04.848748 kernel: kvm-guest: setup PV IPIs May 15 10:47:04.848754 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 10:47:04.848761 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 10:47:04.848768 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 15 10:47:04.848774 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 10:47:04.848781 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 10:47:04.848787 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 10:47:04.848799 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 10:47:04.848806 kernel: Spectre V2 : Mitigation: Retpolines May 15 10:47:04.848813 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 10:47:04.848821 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 10:47:04.848828 kernel: RETBleed: Mitigation: untrained return thunk May 15 10:47:04.848835 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 10:47:04.848842 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 10:47:04.848849 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 10:47:04.848856 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 10:47:04.848864 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 10:47:04.848871 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 10:47:04.848878 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 10:47:04.848884 kernel: Freeing SMP alternatives memory: 32K May 15 10:47:04.848891 kernel: pid_max: default: 32768 minimum: 301 May 15 10:47:04.848898 kernel: LSM: Security Framework initializing May 15 10:47:04.848904 kernel: SELinux: Initializing. May 15 10:47:04.848911 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:47:04.848920 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:47:04.848927 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 10:47:04.848934 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 10:47:04.848940 kernel: ... version: 0 May 15 10:47:04.848947 kernel: ... bit width: 48 May 15 10:47:04.848954 kernel: ... generic registers: 6 May 15 10:47:04.848961 kernel: ... value mask: 0000ffffffffffff May 15 10:47:04.848967 kernel: ... max period: 00007fffffffffff May 15 10:47:04.848974 kernel: ... fixed-purpose events: 0 May 15 10:47:04.848982 kernel: ... event mask: 000000000000003f May 15 10:47:04.848989 kernel: signal: max sigframe size: 1776 May 15 10:47:04.848995 kernel: rcu: Hierarchical SRCU implementation. May 15 10:47:04.849002 kernel: smp: Bringing up secondary CPUs ... May 15 10:47:04.849009 kernel: x86: Booting SMP configuration: May 15 10:47:04.849016 kernel: .... node #0, CPUs: #1 May 15 10:47:04.849022 kernel: kvm-clock: cpu 1, msr 9519a041, secondary cpu clock May 15 10:47:04.849029 kernel: kvm-guest: setup async PF for cpu 1 May 15 10:47:04.849036 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 May 15 10:47:04.849044 kernel: #2 May 15 10:47:04.849051 kernel: kvm-clock: cpu 2, msr 9519a081, secondary cpu clock May 15 10:47:04.849058 kernel: kvm-guest: setup async PF for cpu 2 May 15 10:47:04.849064 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 May 15 10:47:04.849071 kernel: #3 May 15 10:47:04.849078 kernel: kvm-clock: cpu 3, msr 9519a0c1, secondary cpu clock May 15 10:47:04.849084 kernel: kvm-guest: setup async PF for cpu 3 May 15 10:47:04.849091 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 May 15 10:47:04.849098 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:47:04.849106 kernel: smpboot: Max logical packages: 1 May 15 10:47:04.849113 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 15 10:47:04.849119 kernel: devtmpfs: initialized May 15 10:47:04.849126 kernel: x86/mm: Memory block size: 128MB May 15 10:47:04.849133 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:47:04.849140 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:47:04.849147 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:47:04.849153 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:47:04.849160 kernel: audit: initializing netlink subsys (disabled) May 15 10:47:04.849168 kernel: audit: type=2000 audit(1747306024.355:1): state=initialized audit_enabled=0 res=1 May 15 10:47:04.849175 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:47:04.849181 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 10:47:04.849188 kernel: cpuidle: using governor menu May 15 10:47:04.849195 kernel: ACPI: bus type PCI registered May 15 10:47:04.849202 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:47:04.849208 kernel: dca service started, version 1.12.1 May 15 10:47:04.849216 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 10:47:04.849223 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 10:47:04.849231 kernel: PCI: Using configuration type 1 for base access May 15 10:47:04.849237 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 10:47:04.849244 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:47:04.849251 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:47:04.849258 kernel: ACPI: Added _OSI(Module Device) May 15 10:47:04.849265 kernel: ACPI: Added _OSI(Processor Device) May 15 10:47:04.849272 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:47:04.849278 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:47:04.849285 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:47:04.849293 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:47:04.849300 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:47:04.849307 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:47:04.849313 kernel: ACPI: Interpreter enabled May 15 10:47:04.849320 kernel: ACPI: PM: (supports S0 S3 S5) May 15 10:47:04.849327 kernel: ACPI: Using IOAPIC for interrupt routing May 15 10:47:04.849334 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 10:47:04.849340 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 10:47:04.849347 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:47:04.849498 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:47:04.849574 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 10:47:04.849642 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 10:47:04.849651 kernel: PCI host bridge to bus 0000:00 May 15 10:47:04.849729 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 10:47:04.849793 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 10:47:04.849855 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 10:47:04.849918 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 10:47:04.849978 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 10:47:04.850038 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x8ffffffff window] May 15 10:47:04.850099 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:47:04.850177 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 10:47:04.850252 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 10:47:04.850331 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] May 15 10:47:04.850415 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] May 15 10:47:04.850502 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] May 15 10:47:04.850572 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 10:47:04.850648 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:47:04.850748 kernel: pci 0000:00:02.0: reg 0x10: [io 0xc0c0-0xc0df] May 15 10:47:04.850866 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] May 15 10:47:04.850965 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] May 15 10:47:04.851067 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 10:47:04.851160 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc000-0xc07f] May 15 10:47:04.851257 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] May 15 10:47:04.851350 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] May 15 10:47:04.851480 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 10:47:04.851576 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc0e0-0xc0ff] May 15 10:47:04.851674 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] May 15 10:47:04.851766 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] May 15 10:47:04.851856 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] May 15 10:47:04.851957 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 10:47:04.852050 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 10:47:04.852151 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 10:47:04.852244 kernel: pci 0000:00:1f.2: reg 0x20: [io 0xc100-0xc11f] May 15 10:47:04.852341 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xfebd4000-0xfebd4fff] May 15 10:47:04.852466 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 10:47:04.852562 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x0700-0x073f] May 15 10:47:04.852575 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 10:47:04.852585 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 10:47:04.852595 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 10:47:04.852604 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 10:47:04.852617 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 10:47:04.852626 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 10:47:04.852635 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 10:47:04.852645 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 10:47:04.852654 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 10:47:04.852663 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 10:47:04.852672 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 10:47:04.852681 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 10:47:04.852690 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 10:47:04.852701 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 10:47:04.852710 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 10:47:04.852719 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 10:47:04.852729 kernel: iommu: Default domain type: Translated May 15 10:47:04.852738 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 10:47:04.852829 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 10:47:04.852921 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 10:47:04.853013 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 10:47:04.853026 kernel: vgaarb: loaded May 15 10:47:04.853038 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:47:04.853048 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:47:04.853057 kernel: PTP clock support registered May 15 10:47:04.853066 kernel: PCI: Using ACPI for IRQ routing May 15 10:47:04.853075 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 10:47:04.853084 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] May 15 10:47:04.853094 kernel: e820: reserve RAM buffer [mem 0x9cfdc000-0x9fffffff] May 15 10:47:04.853103 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 10:47:04.853112 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 10:47:04.853123 kernel: clocksource: Switched to clocksource kvm-clock May 15 10:47:04.853132 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:47:04.853142 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:47:04.853151 kernel: pnp: PnP ACPI init May 15 10:47:04.853250 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 10:47:04.853264 kernel: pnp: PnP ACPI: found 6 devices May 15 10:47:04.853273 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 10:47:04.853283 kernel: NET: Registered PF_INET protocol family May 15 10:47:04.853294 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:47:04.853304 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:47:04.853313 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:47:04.853323 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:47:04.853332 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:47:04.853341 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:47:04.853350 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:47:04.853359 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:47:04.853371 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:47:04.853380 kernel: NET: Registered PF_XDP protocol family May 15 10:47:04.853494 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 10:47:04.853578 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 10:47:04.853659 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 10:47:04.853738 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 10:47:04.853819 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 10:47:04.853900 kernel: pci_bus 0000:00: resource 9 [mem 0x100000000-0x8ffffffff window] May 15 10:47:04.853913 kernel: PCI: CLS 0 bytes, default 64 May 15 10:47:04.853925 kernel: Initialise system trusted keyrings May 15 10:47:04.853935 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:47:04.853944 kernel: Key type asymmetric registered May 15 10:47:04.853953 kernel: Asymmetric key parser 'x509' registered May 15 10:47:04.853962 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:47:04.853971 kernel: io scheduler mq-deadline registered May 15 10:47:04.853980 kernel: io scheduler kyber registered May 15 10:47:04.853989 kernel: io scheduler bfq registered May 15 10:47:04.853998 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 10:47:04.854010 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 10:47:04.854020 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 10:47:04.854029 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 10:47:04.854038 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:47:04.854048 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 10:47:04.854057 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 10:47:04.854066 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 10:47:04.854075 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 10:47:04.854173 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 10:47:04.854190 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 10:47:04.854278 kernel: rtc_cmos 00:04: registered as rtc0 May 15 10:47:04.854362 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T10:47:04 UTC (1747306024) May 15 10:47:04.854471 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 10:47:04.854485 kernel: NET: Registered PF_INET6 protocol family May 15 10:47:04.854494 kernel: Segment Routing with IPv6 May 15 10:47:04.854503 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:47:04.854512 kernel: NET: Registered PF_PACKET protocol family May 15 10:47:04.854525 kernel: Key type dns_resolver registered May 15 10:47:04.854534 kernel: IPI shorthand broadcast: enabled May 15 10:47:04.854543 kernel: sched_clock: Marking stable (414147004, 103839105)->(568160907, -50174798) May 15 10:47:04.854552 kernel: registered taskstats version 1 May 15 10:47:04.854561 kernel: Loading compiled-in X.509 certificates May 15 10:47:04.854570 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 10:47:04.854585 kernel: Key type .fscrypt registered May 15 10:47:04.854609 kernel: Key type fscrypt-provisioning registered May 15 10:47:04.854640 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:47:04.854653 kernel: ima: Allocated hash algorithm: sha1 May 15 10:47:04.854662 kernel: ima: No architecture policies found May 15 10:47:04.854671 kernel: clk: Disabling unused clocks May 15 10:47:04.854680 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 10:47:04.854690 kernel: Write protecting the kernel read-only data: 28672k May 15 10:47:04.854699 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 10:47:04.854708 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 10:47:04.854717 kernel: Run /init as init process May 15 10:47:04.854726 kernel: with arguments: May 15 10:47:04.854737 kernel: /init May 15 10:47:04.854746 kernel: with environment: May 15 10:47:04.854754 kernel: HOME=/ May 15 10:47:04.854763 kernel: TERM=linux May 15 10:47:04.854781 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:47:04.854802 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:47:04.854815 systemd[1]: Detected virtualization kvm. May 15 10:47:04.854827 systemd[1]: Detected architecture x86-64. May 15 10:47:04.854837 systemd[1]: Running in initrd. May 15 10:47:04.854847 systemd[1]: No hostname configured, using default hostname. May 15 10:47:04.854856 systemd[1]: Hostname set to . May 15 10:47:04.854867 systemd[1]: Initializing machine ID from VM UUID. May 15 10:47:04.854877 systemd[1]: Queued start job for default target initrd.target. May 15 10:47:04.854887 systemd[1]: Started systemd-ask-password-console.path. May 15 10:47:04.854897 systemd[1]: Reached target cryptsetup.target. May 15 10:47:04.854906 systemd[1]: Reached target paths.target. May 15 10:47:04.854918 systemd[1]: Reached target slices.target. May 15 10:47:04.854937 systemd[1]: Reached target swap.target. May 15 10:47:04.854949 systemd[1]: Reached target timers.target. May 15 10:47:04.854960 systemd[1]: Listening on iscsid.socket. May 15 10:47:04.854970 systemd[1]: Listening on iscsiuio.socket. May 15 10:47:04.854983 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:47:04.854993 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:47:04.855003 systemd[1]: Listening on systemd-journald.socket. May 15 10:47:04.855013 systemd[1]: Listening on systemd-networkd.socket. May 15 10:47:04.855024 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:47:04.855034 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:47:04.855044 systemd[1]: Reached target sockets.target. May 15 10:47:04.855054 systemd[1]: Starting kmod-static-nodes.service... May 15 10:47:04.855065 systemd[1]: Finished network-cleanup.service. May 15 10:47:04.855077 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:47:04.855087 systemd[1]: Starting systemd-journald.service... May 15 10:47:04.855097 systemd[1]: Starting systemd-modules-load.service... May 15 10:47:04.855107 systemd[1]: Starting systemd-resolved.service... May 15 10:47:04.855117 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:47:04.855127 systemd[1]: Finished kmod-static-nodes.service. May 15 10:47:04.855138 kernel: audit: type=1130 audit(1747306024.850:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.855148 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:47:04.855162 systemd-journald[197]: Journal started May 15 10:47:04.855218 systemd-journald[197]: Runtime Journal (/run/log/journal/e669ab37bbc349688b955cadbb9fac2b) is 6.0M, max 48.5M, 42.5M free. May 15 10:47:04.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.854814 systemd-modules-load[198]: Inserted module 'overlay' May 15 10:47:04.910215 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:47:04.910242 kernel: audit: type=1130 audit(1747306024.888:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.910262 systemd[1]: Started systemd-journald.service. May 15 10:47:04.910279 kernel: audit: type=1130 audit(1747306024.893:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.910291 kernel: audit: type=1130 audit(1747306024.893:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.910306 kernel: audit: type=1130 audit(1747306024.893:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.910318 kernel: Bridge firewalling registered May 15 10:47:04.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.870813 systemd-resolved[199]: Positive Trust Anchors: May 15 10:47:04.870824 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:47:04.870850 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:47:04.922555 kernel: audit: type=1130 audit(1747306024.918:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.873629 systemd-resolved[199]: Defaulting to hostname 'linux'. May 15 10:47:04.894886 systemd[1]: Started systemd-resolved.service. May 15 10:47:04.895200 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:47:04.926000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.895328 systemd[1]: Reached target nss-lookup.target. May 15 10:47:04.929495 kernel: audit: type=1130 audit(1747306024.926:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.896106 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:47:04.907773 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:47:04.909190 systemd-modules-load[198]: Inserted module 'br_netfilter' May 15 10:47:04.933850 kernel: SCSI subsystem initialized May 15 10:47:04.914409 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:47:04.924731 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:47:04.927160 systemd[1]: Starting dracut-cmdline.service... May 15 10:47:04.940758 dracut-cmdline[216]: dracut-dracut-053 May 15 10:47:04.943080 dracut-cmdline[216]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:47:04.950286 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:47:04.950301 kernel: device-mapper: uevent: version 1.0.3 May 15 10:47:04.950314 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:47:04.953300 systemd-modules-load[198]: Inserted module 'dm_multipath' May 15 10:47:04.954003 systemd[1]: Finished systemd-modules-load.service. May 15 10:47:04.958838 kernel: audit: type=1130 audit(1747306024.955:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.955696 systemd[1]: Starting systemd-sysctl.service... May 15 10:47:04.963689 systemd[1]: Finished systemd-sysctl.service. May 15 10:47:04.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:04.968453 kernel: audit: type=1130 audit(1747306024.964:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:05.007466 kernel: Loading iSCSI transport class v2.0-870. May 15 10:47:05.023465 kernel: iscsi: registered transport (tcp) May 15 10:47:05.044460 kernel: iscsi: registered transport (qla4xxx) May 15 10:47:05.044484 kernel: QLogic iSCSI HBA Driver May 15 10:47:05.073746 systemd[1]: Finished dracut-cmdline.service. May 15 10:47:05.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:05.075518 systemd[1]: Starting dracut-pre-udev.service... May 15 10:47:05.123471 kernel: raid6: avx2x4 gen() 24035 MB/s May 15 10:47:05.140462 kernel: raid6: avx2x4 xor() 6577 MB/s May 15 10:47:05.157479 kernel: raid6: avx2x2 gen() 23841 MB/s May 15 10:47:05.174471 kernel: raid6: avx2x2 xor() 14361 MB/s May 15 10:47:05.191483 kernel: raid6: avx2x1 gen() 22507 MB/s May 15 10:47:05.208489 kernel: raid6: avx2x1 xor() 12546 MB/s May 15 10:47:05.225476 kernel: raid6: sse2x4 gen() 14630 MB/s May 15 10:47:05.242453 kernel: raid6: sse2x4 xor() 7053 MB/s May 15 10:47:05.261453 kernel: raid6: sse2x2 gen() 16220 MB/s May 15 10:47:05.278473 kernel: raid6: sse2x2 xor() 9840 MB/s May 15 10:47:05.295491 kernel: raid6: sse2x1 gen() 12101 MB/s May 15 10:47:05.313049 kernel: raid6: sse2x1 xor() 6632 MB/s May 15 10:47:05.313133 kernel: raid6: using algorithm avx2x4 gen() 24035 MB/s May 15 10:47:05.313146 kernel: raid6: .... xor() 6577 MB/s, rmw enabled May 15 10:47:05.313815 kernel: raid6: using avx2x2 recovery algorithm May 15 10:47:05.328871 kernel: xor: automatically using best checksumming function avx May 15 10:47:05.433473 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 10:47:05.441141 systemd[1]: Finished dracut-pre-udev.service. May 15 10:47:05.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:05.442000 audit: BPF prog-id=7 op=LOAD May 15 10:47:05.442000 audit: BPF prog-id=8 op=LOAD May 15 10:47:05.443560 systemd[1]: Starting systemd-udevd.service... May 15 10:47:05.455086 systemd-udevd[399]: Using default interface naming scheme 'v252'. May 15 10:47:05.458790 systemd[1]: Started systemd-udevd.service. May 15 10:47:05.459000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:05.460863 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:47:05.468883 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 15 10:47:05.495165 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:47:05.496000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:05.497482 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:47:05.527502 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:47:05.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:05.561467 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:47:05.567272 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:47:05.567285 kernel: GPT:9289727 != 19775487 May 15 10:47:05.567294 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:47:05.567303 kernel: GPT:9289727 != 19775487 May 15 10:47:05.567311 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:47:05.567319 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:47:05.575461 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:47:05.589506 kernel: libata version 3.00 loaded. May 15 10:47:05.592705 kernel: AVX2 version of gcm_enc/dec engaged. May 15 10:47:05.592728 kernel: AES CTR mode by8 optimization enabled May 15 10:47:05.596454 kernel: ahci 0000:00:1f.2: version 3.0 May 15 10:47:05.599688 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 10:47:05.599701 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 10:47:05.599783 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 10:47:05.599856 kernel: scsi host0: ahci May 15 10:47:05.599949 kernel: scsi host1: ahci May 15 10:47:05.600031 kernel: scsi host2: ahci May 15 10:47:05.600128 kernel: scsi host3: ahci May 15 10:47:05.600208 kernel: scsi host4: ahci May 15 10:47:05.600287 kernel: scsi host5: ahci May 15 10:47:05.600373 kernel: ata1: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4100 irq 34 May 15 10:47:05.600386 kernel: ata2: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4180 irq 34 May 15 10:47:05.600395 kernel: ata3: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4200 irq 34 May 15 10:47:05.600404 kernel: ata4: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4280 irq 34 May 15 10:47:05.600412 kernel: ata5: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4300 irq 34 May 15 10:47:05.600421 kernel: ata6: SATA max UDMA/133 abar m4096@0xfebd4000 port 0xfebd4380 irq 34 May 15 10:47:05.606448 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (459) May 15 10:47:05.607016 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:47:05.655215 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:47:05.658846 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:47:05.660050 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:47:05.666706 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:47:05.668504 systemd[1]: Starting disk-uuid.service... May 15 10:47:05.676343 disk-uuid[529]: Primary Header is updated. May 15 10:47:05.676343 disk-uuid[529]: Secondary Entries is updated. May 15 10:47:05.676343 disk-uuid[529]: Secondary Header is updated. May 15 10:47:05.680516 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:47:05.682460 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:47:05.911471 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 10:47:05.911555 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 10:47:05.912455 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 10:47:05.913458 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 10:47:05.914454 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 10:47:05.915453 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 10:47:05.917045 kernel: ata3.00: applying bridge limits May 15 10:47:05.917059 kernel: ata3.00: configured for UDMA/100 May 15 10:47:05.917461 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 10:47:05.920013 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 10:47:05.953619 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 10:47:05.970914 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 10:47:05.970933 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 10:47:06.695574 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:47:06.695631 disk-uuid[530]: The operation has completed successfully. May 15 10:47:06.720994 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:47:06.721099 systemd[1]: Finished disk-uuid.service. May 15 10:47:06.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.724351 systemd[1]: Starting verity-setup.service... May 15 10:47:06.735464 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 10:47:06.754710 systemd[1]: Found device dev-mapper-usr.device. May 15 10:47:06.756536 systemd[1]: Mounting sysusr-usr.mount... May 15 10:47:06.758485 systemd[1]: Finished verity-setup.service. May 15 10:47:06.759000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.822384 systemd[1]: Mounted sysusr-usr.mount. May 15 10:47:06.823944 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:47:06.822970 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:47:06.823966 systemd[1]: Starting ignition-setup.service... May 15 10:47:06.826693 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:47:06.838956 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:47:06.839020 kernel: BTRFS info (device vda6): using free space tree May 15 10:47:06.839039 kernel: BTRFS info (device vda6): has skinny extents May 15 10:47:06.849256 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:47:06.889808 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:47:06.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.895000 audit: BPF prog-id=9 op=LOAD May 15 10:47:06.896780 systemd[1]: Starting systemd-networkd.service... May 15 10:47:06.918723 systemd-networkd[715]: lo: Link UP May 15 10:47:06.918736 systemd-networkd[715]: lo: Gained carrier May 15 10:47:06.920766 systemd-networkd[715]: Enumeration completed May 15 10:47:06.920859 systemd[1]: Started systemd-networkd.service. May 15 10:47:06.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.921477 systemd[1]: Reached target network.target. May 15 10:47:06.924541 systemd[1]: Starting iscsiuio.service... May 15 10:47:06.926211 systemd-networkd[715]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:47:06.928379 systemd[1]: Started iscsiuio.service. May 15 10:47:06.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.929706 systemd[1]: Starting iscsid.service... May 15 10:47:06.932176 systemd-networkd[715]: eth0: Link UP May 15 10:47:06.932184 systemd-networkd[715]: eth0: Gained carrier May 15 10:47:06.933674 iscsid[720]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:47:06.933674 iscsid[720]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:47:06.933674 iscsid[720]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:47:06.933674 iscsid[720]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:47:06.933674 iscsid[720]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:47:06.933674 iscsid[720]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:47:06.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.933595 systemd[1]: Started iscsid.service. May 15 10:47:06.934828 systemd[1]: Starting dracut-initqueue.service... May 15 10:47:06.950815 systemd[1]: Finished dracut-initqueue.service. May 15 10:47:06.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.951305 systemd[1]: Reached target remote-fs-pre.target. May 15 10:47:06.951493 systemd-networkd[715]: eth0: DHCPv4 address 10.0.0.140/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:47:06.953184 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:47:06.954041 systemd[1]: Reached target remote-fs.target. May 15 10:47:06.966160 systemd[1]: Starting dracut-pre-mount.service... May 15 10:47:06.973896 systemd[1]: Finished dracut-pre-mount.service. May 15 10:47:06.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.976000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:06.975089 systemd[1]: Finished ignition-setup.service. May 15 10:47:06.977400 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:47:07.032238 ignition[735]: Ignition 2.14.0 May 15 10:47:07.032247 ignition[735]: Stage: fetch-offline May 15 10:47:07.032295 ignition[735]: no configs at "/usr/lib/ignition/base.d" May 15 10:47:07.032303 ignition[735]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:47:07.032405 ignition[735]: parsed url from cmdline: "" May 15 10:47:07.032408 ignition[735]: no config URL provided May 15 10:47:07.032412 ignition[735]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:47:07.032418 ignition[735]: no config at "/usr/lib/ignition/user.ign" May 15 10:47:07.032449 ignition[735]: op(1): [started] loading QEMU firmware config module May 15 10:47:07.032453 ignition[735]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:47:07.035095 ignition[735]: op(1): [finished] loading QEMU firmware config module May 15 10:47:07.078376 ignition[735]: parsing config with SHA512: 9f8a6a620c58311447f8b572015b1f52e4eb84e0edca397635c550c026298027d35b1b1d994584ed83be7d2a3dedf490d7b7f434c08a04ba78d78f55316a0d9d May 15 10:47:07.083924 unknown[735]: fetched base config from "system" May 15 10:47:07.084310 ignition[735]: fetch-offline: fetch-offline passed May 15 10:47:07.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:07.083932 unknown[735]: fetched user config from "qemu" May 15 10:47:07.084371 ignition[735]: Ignition finished successfully May 15 10:47:07.084879 systemd-resolved[199]: Detected conflict on linux IN A 10.0.0.140 May 15 10:47:07.084889 systemd-resolved[199]: Hostname conflict, changing published hostname from 'linux' to 'linux11'. May 15 10:47:07.085284 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:47:07.086424 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:47:07.087052 systemd[1]: Starting ignition-kargs.service... May 15 10:47:07.095116 ignition[743]: Ignition 2.14.0 May 15 10:47:07.109054 systemd[1]: Finished ignition-kargs.service. May 15 10:47:07.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:07.095121 ignition[743]: Stage: kargs May 15 10:47:07.095196 ignition[743]: no configs at "/usr/lib/ignition/base.d" May 15 10:47:07.111391 systemd[1]: Starting ignition-disks.service... May 15 10:47:07.095203 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:47:07.096041 ignition[743]: kargs: kargs passed May 15 10:47:07.096070 ignition[743]: Ignition finished successfully May 15 10:47:07.118143 ignition[749]: Ignition 2.14.0 May 15 10:47:07.118154 ignition[749]: Stage: disks May 15 10:47:07.118248 ignition[749]: no configs at "/usr/lib/ignition/base.d" May 15 10:47:07.118258 ignition[749]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:47:07.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:07.120041 systemd[1]: Finished ignition-disks.service. May 15 10:47:07.119233 ignition[749]: disks: disks passed May 15 10:47:07.121247 systemd[1]: Reached target initrd-root-device.target. May 15 10:47:07.119266 ignition[749]: Ignition finished successfully May 15 10:47:07.123048 systemd[1]: Reached target local-fs-pre.target. May 15 10:47:07.123864 systemd[1]: Reached target local-fs.target. May 15 10:47:07.125363 systemd[1]: Reached target sysinit.target. May 15 10:47:07.126759 systemd[1]: Reached target basic.target. May 15 10:47:07.128215 systemd[1]: Starting systemd-fsck-root.service... May 15 10:47:07.163052 systemd-fsck[757]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 15 10:47:07.639589 systemd[1]: Finished systemd-fsck-root.service. May 15 10:47:07.639000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:07.641008 systemd[1]: Mounting sysroot.mount... May 15 10:47:07.686461 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:47:07.686743 systemd[1]: Mounted sysroot.mount. May 15 10:47:07.687125 systemd[1]: Reached target initrd-root-fs.target. May 15 10:47:07.689478 systemd[1]: Mounting sysroot-usr.mount... May 15 10:47:07.690685 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:47:07.690713 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:47:07.690733 systemd[1]: Reached target ignition-diskful.target. May 15 10:47:07.692672 systemd[1]: Mounted sysroot-usr.mount. May 15 10:47:07.694736 systemd[1]: Starting initrd-setup-root.service... May 15 10:47:07.699207 initrd-setup-root[767]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:47:07.701883 initrd-setup-root[775]: cut: /sysroot/etc/group: No such file or directory May 15 10:47:07.705581 initrd-setup-root[783]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:47:07.708199 initrd-setup-root[791]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:47:07.730676 systemd[1]: Finished initrd-setup-root.service. May 15 10:47:07.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:07.732303 systemd[1]: Starting ignition-mount.service... May 15 10:47:07.733234 systemd[1]: Starting sysroot-boot.service... May 15 10:47:07.740831 bash[809]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:47:07.749128 ignition[810]: INFO : Ignition 2.14.0 May 15 10:47:07.749128 ignition[810]: INFO : Stage: mount May 15 10:47:07.750000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:07.750560 systemd[1]: Finished sysroot-boot.service. May 15 10:47:07.752835 ignition[810]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:47:07.752835 ignition[810]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:47:07.752835 ignition[810]: INFO : mount: mount passed May 15 10:47:07.752835 ignition[810]: INFO : Ignition finished successfully May 15 10:47:07.756825 systemd[1]: Finished ignition-mount.service. May 15 10:47:07.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:07.765453 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:47:07.774537 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (819) May 15 10:47:07.774575 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:47:07.774585 kernel: BTRFS info (device vda6): using free space tree May 15 10:47:07.776457 kernel: BTRFS info (device vda6): has skinny extents May 15 10:47:07.779277 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:47:07.780882 systemd[1]: Starting ignition-files.service... May 15 10:47:07.794583 ignition[839]: INFO : Ignition 2.14.0 May 15 10:47:07.794583 ignition[839]: INFO : Stage: files May 15 10:47:07.796294 ignition[839]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:47:07.796294 ignition[839]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:47:07.799222 ignition[839]: DEBUG : files: compiled without relabeling support, skipping May 15 10:47:07.800531 ignition[839]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:47:07.800531 ignition[839]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:47:07.804053 ignition[839]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:47:07.805527 ignition[839]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:47:07.807361 unknown[839]: wrote ssh authorized keys file for user: core May 15 10:47:07.808456 ignition[839]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:47:07.809879 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 10:47:07.809879 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 10:47:07.850797 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:47:07.945016 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 10:47:07.945016 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:47:07.948736 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:47:07.948736 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:47:07.952096 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:47:07.953762 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:47:07.955481 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:47:07.957160 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:47:07.959068 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:47:07.961148 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:47:07.961148 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:47:07.961148 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 10:47:07.961148 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 10:47:07.961148 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 10:47:07.961148 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 15 10:47:08.316542 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:47:08.577551 systemd-networkd[715]: eth0: Gained IPv6LL May 15 10:47:08.707329 ignition[839]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 10:47:08.707329 ignition[839]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:47:08.712099 ignition[839]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:47:08.746595 ignition[839]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:47:08.748263 ignition[839]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:47:08.748263 ignition[839]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:47:08.748263 ignition[839]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:47:08.748263 ignition[839]: INFO : files: files passed May 15 10:47:08.748263 ignition[839]: INFO : Ignition finished successfully May 15 10:47:08.755638 systemd[1]: Finished ignition-files.service. May 15 10:47:08.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.757386 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:47:08.757839 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:47:08.758393 systemd[1]: Starting ignition-quench.service... May 15 10:47:08.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.761549 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:47:08.761665 systemd[1]: Finished ignition-quench.service. May 15 10:47:08.767506 initrd-setup-root-after-ignition[865]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:47:08.770371 initrd-setup-root-after-ignition[867]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:47:08.772500 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:47:08.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.773706 systemd[1]: Reached target ignition-complete.target. May 15 10:47:08.776163 systemd[1]: Starting initrd-parse-etc.service... May 15 10:47:08.789109 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:47:08.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.789191 systemd[1]: Finished initrd-parse-etc.service. May 15 10:47:08.791404 systemd[1]: Reached target initrd-fs.target. May 15 10:47:08.792396 systemd[1]: Reached target initrd.target. May 15 10:47:08.794344 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:47:08.795079 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:47:08.805779 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:47:08.806000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.807579 systemd[1]: Starting initrd-cleanup.service... May 15 10:47:08.817242 systemd[1]: Stopped target nss-lookup.target. May 15 10:47:08.818372 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:47:08.820494 systemd[1]: Stopped target timers.target. May 15 10:47:08.822558 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:47:08.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.822666 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:47:08.824530 systemd[1]: Stopped target initrd.target. May 15 10:47:08.826605 systemd[1]: Stopped target basic.target. May 15 10:47:08.828797 systemd[1]: Stopped target ignition-complete.target. May 15 10:47:08.830767 systemd[1]: Stopped target ignition-diskful.target. May 15 10:47:08.832803 systemd[1]: Stopped target initrd-root-device.target. May 15 10:47:08.835088 systemd[1]: Stopped target remote-fs.target. May 15 10:47:08.837130 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:47:08.839261 systemd[1]: Stopped target sysinit.target. May 15 10:47:08.841167 systemd[1]: Stopped target local-fs.target. May 15 10:47:08.843009 systemd[1]: Stopped target local-fs-pre.target. May 15 10:47:08.844871 systemd[1]: Stopped target swap.target. May 15 10:47:08.848000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.846685 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:47:08.846803 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:47:08.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.848670 systemd[1]: Stopped target cryptsetup.target. May 15 10:47:08.854000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.850461 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:47:08.850547 systemd[1]: Stopped dracut-initqueue.service. May 15 10:47:08.852697 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:47:08.852781 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:47:08.854730 systemd[1]: Stopped target paths.target. May 15 10:47:08.856429 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:47:08.860526 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:47:08.862017 systemd[1]: Stopped target slices.target. May 15 10:47:08.863673 systemd[1]: Stopped target sockets.target. May 15 10:47:08.865614 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:47:08.870000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.865693 systemd[1]: Closed iscsid.socket. May 15 10:47:08.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.867152 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:47:08.867219 systemd[1]: Closed iscsiuio.socket. May 15 10:47:08.868580 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:47:08.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.879584 ignition[880]: INFO : Ignition 2.14.0 May 15 10:47:08.879584 ignition[880]: INFO : Stage: umount May 15 10:47:08.879584 ignition[880]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:47:08.879584 ignition[880]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:47:08.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.868682 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:47:08.884000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.885490 ignition[880]: INFO : umount: umount passed May 15 10:47:08.885490 ignition[880]: INFO : Ignition finished successfully May 15 10:47:08.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.870313 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:47:08.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.870399 systemd[1]: Stopped ignition-files.service. May 15 10:47:08.872777 systemd[1]: Stopping ignition-mount.service... May 15 10:47:08.892000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.874073 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:47:08.874185 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:47:08.876649 systemd[1]: Stopping sysroot-boot.service... May 15 10:47:08.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.877481 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:47:08.877603 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:47:08.878638 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:47:08.878728 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:47:08.881666 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:47:08.881752 systemd[1]: Stopped ignition-mount.service. May 15 10:47:08.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.884720 systemd[1]: Stopped target network.target. May 15 10:47:08.885876 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:47:08.885938 systemd[1]: Stopped ignition-disks.service. May 15 10:47:08.888331 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:47:08.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.888369 systemd[1]: Stopped ignition-kargs.service. May 15 10:47:08.888990 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:47:08.889019 systemd[1]: Stopped ignition-setup.service. May 15 10:47:08.892699 systemd[1]: Stopping systemd-networkd.service... May 15 10:47:08.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.893280 systemd[1]: Stopping systemd-resolved.service... May 15 10:47:08.913000 audit: BPF prog-id=6 op=UNLOAD May 15 10:47:08.915000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.895747 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:47:08.917000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.895819 systemd[1]: Finished initrd-cleanup.service. May 15 10:47:08.902530 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:47:08.902625 systemd[1]: Stopped systemd-resolved.service. May 15 10:47:08.905518 systemd-networkd[715]: eth0: DHCPv6 lease lost May 15 10:47:08.924000 audit: BPF prog-id=9 op=UNLOAD May 15 10:47:08.906840 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:47:08.925000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.906920 systemd[1]: Stopped systemd-networkd.service. May 15 10:47:08.907912 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:47:08.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.907938 systemd[1]: Closed systemd-networkd.socket. May 15 10:47:08.911297 systemd[1]: Stopping network-cleanup.service... May 15 10:47:08.912550 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:47:08.912610 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:47:08.914013 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:47:08.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.914046 systemd[1]: Stopped systemd-sysctl.service. May 15 10:47:08.915988 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:47:08.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.916026 systemd[1]: Stopped systemd-modules-load.service. May 15 10:47:08.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.917690 systemd[1]: Stopping systemd-udevd.service... May 15 10:47:08.922100 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:47:08.943000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.925203 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:47:08.925344 systemd[1]: Stopped network-cleanup.service. May 15 10:47:08.947000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:08.927877 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:47:08.928031 systemd[1]: Stopped systemd-udevd.service. May 15 10:47:08.931340 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:47:08.931391 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:47:08.931879 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:47:08.931913 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:47:08.932224 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:47:08.932269 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:47:08.932833 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:47:08.932872 systemd[1]: Stopped dracut-cmdline.service. May 15 10:47:08.939024 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:47:08.939102 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:47:08.940551 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:47:08.941991 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:47:08.942045 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:47:08.945456 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:47:08.945560 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:47:08.969713 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:47:09.113753 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:47:09.113862 systemd[1]: Stopped sysroot-boot.service. May 15 10:47:09.115000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:09.115948 systemd[1]: Reached target initrd-switch-root.target. May 15 10:47:09.116286 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:47:09.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:09.116323 systemd[1]: Stopped initrd-setup-root.service. May 15 10:47:09.119893 systemd[1]: Starting initrd-switch-root.service... May 15 10:47:09.139397 systemd[1]: Switching root. May 15 10:47:09.159236 iscsid[720]: iscsid shutting down. May 15 10:47:09.159970 systemd-journald[197]: Received SIGTERM from PID 1 (n/a). May 15 10:47:09.160011 systemd-journald[197]: Journal stopped May 15 10:47:12.043340 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:47:12.043406 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:47:12.043421 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:47:12.043454 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:47:12.043470 kernel: SELinux: policy capability open_perms=1 May 15 10:47:12.043492 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:47:12.043508 kernel: SELinux: policy capability always_check_network=0 May 15 10:47:12.043525 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:47:12.043537 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:47:12.043552 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:47:12.043564 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:47:12.043576 kernel: kauditd_printk_skb: 64 callbacks suppressed May 15 10:47:12.043588 kernel: audit: type=1403 audit(1747306029.219:75): auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:47:12.043607 systemd[1]: Successfully loaded SELinux policy in 39.479ms. May 15 10:47:12.043623 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.504ms. May 15 10:47:12.043638 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:47:12.043651 systemd[1]: Detected virtualization kvm. May 15 10:47:12.043665 systemd[1]: Detected architecture x86-64. May 15 10:47:12.043677 systemd[1]: Detected first boot. May 15 10:47:12.043691 systemd[1]: Initializing machine ID from VM UUID. May 15 10:47:12.043706 kernel: audit: type=1400 audit(1747306029.780:76): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:47:12.043724 kernel: audit: type=1400 audit(1747306029.780:77): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:47:12.043739 kernel: audit: type=1334 audit(1747306029.787:78): prog-id=10 op=LOAD May 15 10:47:12.043752 kernel: audit: type=1334 audit(1747306029.787:79): prog-id=10 op=UNLOAD May 15 10:47:12.043764 kernel: audit: type=1334 audit(1747306029.789:80): prog-id=11 op=LOAD May 15 10:47:12.043776 kernel: audit: type=1334 audit(1747306029.789:81): prog-id=11 op=UNLOAD May 15 10:47:12.043788 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:47:12.043801 kernel: audit: type=1400 audit(1747306029.824:82): avc: denied { associate } for pid=913 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:47:12.043816 kernel: audit: type=1300 audit(1747306029.824:82): arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=896 pid=913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:12.043829 kernel: audit: type=1327 audit(1747306029.824:82): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:47:12.043842 systemd[1]: Populated /etc with preset unit settings. May 15 10:47:12.043856 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:47:12.043870 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:47:12.043884 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:47:12.043906 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:47:12.043920 systemd[1]: Stopped iscsiuio.service. May 15 10:47:12.043933 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:47:12.043945 systemd[1]: Stopped iscsid.service. May 15 10:47:12.043957 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:47:12.043973 systemd[1]: Stopped initrd-switch-root.service. May 15 10:47:12.043985 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:47:12.043998 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:47:12.044010 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:47:12.044023 systemd[1]: Created slice system-getty.slice. May 15 10:47:12.044036 systemd[1]: Created slice system-modprobe.slice. May 15 10:47:12.044049 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:47:12.044063 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:47:12.044079 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:47:12.044092 systemd[1]: Created slice user.slice. May 15 10:47:12.044104 systemd[1]: Started systemd-ask-password-console.path. May 15 10:47:12.044117 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:47:12.044130 systemd[1]: Set up automount boot.automount. May 15 10:47:12.044143 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:47:12.044155 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:47:12.044168 systemd[1]: Stopped target initrd-fs.target. May 15 10:47:12.044182 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:47:12.044198 systemd[1]: Reached target integritysetup.target. May 15 10:47:12.044221 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:47:12.044235 systemd[1]: Reached target remote-fs.target. May 15 10:47:12.044248 systemd[1]: Reached target slices.target. May 15 10:47:12.044262 systemd[1]: Reached target swap.target. May 15 10:47:12.044274 systemd[1]: Reached target torcx.target. May 15 10:47:12.044287 systemd[1]: Reached target veritysetup.target. May 15 10:47:12.044300 systemd[1]: Listening on systemd-coredump.socket. May 15 10:47:12.044313 systemd[1]: Listening on systemd-initctl.socket. May 15 10:47:12.044329 systemd[1]: Listening on systemd-networkd.socket. May 15 10:47:12.044343 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:47:12.044356 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:47:12.044370 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:47:12.044384 systemd[1]: Mounting dev-hugepages.mount... May 15 10:47:12.044397 systemd[1]: Mounting dev-mqueue.mount... May 15 10:47:12.044441 systemd[1]: Mounting media.mount... May 15 10:47:12.044458 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:12.044473 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:47:12.044487 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:47:12.044503 systemd[1]: Mounting tmp.mount... May 15 10:47:12.044516 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:47:12.044530 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:47:12.044545 systemd[1]: Starting kmod-static-nodes.service... May 15 10:47:12.044559 systemd[1]: Starting modprobe@configfs.service... May 15 10:47:12.044572 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:47:12.044587 systemd[1]: Starting modprobe@drm.service... May 15 10:47:12.044601 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:47:12.044616 systemd[1]: Starting modprobe@fuse.service... May 15 10:47:12.044632 systemd[1]: Starting modprobe@loop.service... May 15 10:47:12.044648 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:47:12.044662 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:47:12.044675 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:47:12.044689 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:47:12.044703 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:47:12.044716 kernel: loop: module loaded May 15 10:47:12.044728 kernel: fuse: init (API version 7.34) May 15 10:47:12.044742 systemd[1]: Stopped systemd-journald.service. May 15 10:47:12.044758 systemd[1]: Starting systemd-journald.service... May 15 10:47:12.044772 systemd[1]: Starting systemd-modules-load.service... May 15 10:47:12.044787 systemd[1]: Starting systemd-network-generator.service... May 15 10:47:12.044802 systemd[1]: Starting systemd-remount-fs.service... May 15 10:47:12.044816 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:47:12.044831 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:47:12.044845 systemd[1]: Stopped verity-setup.service. May 15 10:47:12.044861 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:12.044879 systemd-journald[1002]: Journal started May 15 10:47:12.044936 systemd-journald[1002]: Runtime Journal (/run/log/journal/e669ab37bbc349688b955cadbb9fac2b) is 6.0M, max 48.5M, 42.5M free. May 15 10:47:09.219000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:47:09.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:47:09.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:47:09.787000 audit: BPF prog-id=10 op=LOAD May 15 10:47:09.787000 audit: BPF prog-id=10 op=UNLOAD May 15 10:47:09.789000 audit: BPF prog-id=11 op=LOAD May 15 10:47:09.789000 audit: BPF prog-id=11 op=UNLOAD May 15 10:47:09.824000 audit[913]: AVC avc: denied { associate } for pid=913 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:47:09.824000 audit[913]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001058d2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=896 pid=913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:09.824000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:47:09.826000 audit[913]: AVC avc: denied { associate } for pid=913 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:47:09.826000 audit[913]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001059a9 a2=1ed a3=0 items=2 ppid=896 pid=913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:09.826000 audit: CWD cwd="/" May 15 10:47:09.826000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:09.826000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:09.826000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:47:11.896000 audit: BPF prog-id=12 op=LOAD May 15 10:47:11.896000 audit: BPF prog-id=3 op=UNLOAD May 15 10:47:11.897000 audit: BPF prog-id=13 op=LOAD May 15 10:47:11.898000 audit: BPF prog-id=14 op=LOAD May 15 10:47:11.898000 audit: BPF prog-id=4 op=UNLOAD May 15 10:47:11.898000 audit: BPF prog-id=5 op=UNLOAD May 15 10:47:11.899000 audit: BPF prog-id=15 op=LOAD May 15 10:47:11.899000 audit: BPF prog-id=12 op=UNLOAD May 15 10:47:11.899000 audit: BPF prog-id=16 op=LOAD May 15 10:47:11.899000 audit: BPF prog-id=17 op=LOAD May 15 10:47:11.899000 audit: BPF prog-id=13 op=UNLOAD May 15 10:47:11.899000 audit: BPF prog-id=14 op=UNLOAD May 15 10:47:11.900000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:11.903000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:11.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:11.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:11.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:11.916000 audit: BPF prog-id=15 op=UNLOAD May 15 10:47:12.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.027000 audit: BPF prog-id=18 op=LOAD May 15 10:47:12.027000 audit: BPF prog-id=19 op=LOAD May 15 10:47:12.028000 audit: BPF prog-id=20 op=LOAD May 15 10:47:12.028000 audit: BPF prog-id=16 op=UNLOAD May 15 10:47:12.028000 audit: BPF prog-id=17 op=UNLOAD May 15 10:47:12.041000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:47:12.041000 audit[1002]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fff5fa7e370 a2=4000 a3=7fff5fa7e40c items=0 ppid=1 pid=1002 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:12.041000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:47:12.044000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:11.893991 systemd[1]: Queued start job for default target multi-user.target. May 15 10:47:09.822738 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:47:11.894004 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:47:09.823041 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:47:11.900748 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:47:09.823066 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:47:09.823104 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:47:09.823118 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:47:09.823158 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:47:09.823175 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:47:09.823466 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:47:09.823517 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:47:09.823535 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:47:09.823956 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:47:09.824006 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:47:09.824032 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:47:09.824051 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:47:09.824072 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:47:09.824091 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:09Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:47:11.635809 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:11Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:47:11.636044 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:11Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:47:11.636128 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:11Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:47:11.636292 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:11Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:47:11.636336 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:11Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:47:11.636385 /usr/lib/systemd/system-generators/torcx-generator[913]: time="2025-05-15T10:47:11Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:47:12.049475 systemd[1]: Started systemd-journald.service. May 15 10:47:12.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.049977 systemd[1]: Mounted dev-hugepages.mount. May 15 10:47:12.050845 systemd[1]: Mounted dev-mqueue.mount. May 15 10:47:12.051682 systemd[1]: Mounted media.mount. May 15 10:47:12.088308 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:47:12.089185 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:47:12.090072 systemd[1]: Mounted tmp.mount. May 15 10:47:12.090929 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:47:12.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.091963 systemd[1]: Finished kmod-static-nodes.service. May 15 10:47:12.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.092978 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:47:12.093081 systemd[1]: Finished modprobe@configfs.service. May 15 10:47:12.093000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.093000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.094096 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:47:12.094196 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:47:12.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.094000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.095324 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:47:12.095468 systemd[1]: Finished modprobe@drm.service. May 15 10:47:12.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.115326 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:47:12.115607 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:47:12.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.116000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.116666 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:47:12.116767 systemd[1]: Finished modprobe@fuse.service. May 15 10:47:12.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.117727 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:47:12.117823 systemd[1]: Finished modprobe@loop.service. May 15 10:47:12.118000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.118950 systemd[1]: Finished systemd-modules-load.service. May 15 10:47:12.119000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.120016 systemd[1]: Finished systemd-network-generator.service. May 15 10:47:12.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.121113 systemd[1]: Finished systemd-remount-fs.service. May 15 10:47:12.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.122170 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:47:12.122000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.123522 systemd[1]: Reached target network-pre.target. May 15 10:47:12.125358 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:47:12.127001 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:47:12.127759 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:47:12.128982 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:47:12.156947 systemd[1]: Starting systemd-journal-flush.service... May 15 10:47:12.158020 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:47:12.158903 systemd[1]: Starting systemd-random-seed.service... May 15 10:47:12.159925 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:47:12.160547 systemd-journald[1002]: Time spent on flushing to /var/log/journal/e669ab37bbc349688b955cadbb9fac2b is 16.746ms for 1098 entries. May 15 10:47:12.160547 systemd-journald[1002]: System Journal (/var/log/journal/e669ab37bbc349688b955cadbb9fac2b) is 8.0M, max 195.6M, 187.6M free. May 15 10:47:12.432423 systemd-journald[1002]: Received client request to flush runtime journal. May 15 10:47:12.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.370000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.160795 systemd[1]: Starting systemd-sysctl.service... May 15 10:47:12.163915 systemd[1]: Starting systemd-sysusers.service... May 15 10:47:12.165537 systemd[1]: Starting systemd-udev-settle.service... May 15 10:47:12.167875 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:47:12.433920 udevadm[1016]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:47:12.168784 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:47:12.223025 systemd[1]: Finished systemd-sysctl.service. May 15 10:47:12.224502 systemd[1]: Finished systemd-sysusers.service. May 15 10:47:12.369712 systemd[1]: Finished systemd-random-seed.service. May 15 10:47:12.370882 systemd[1]: Reached target first-boot-complete.target. May 15 10:47:12.433000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.433269 systemd[1]: Finished systemd-journal-flush.service. May 15 10:47:12.676252 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:47:12.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.677000 audit: BPF prog-id=21 op=LOAD May 15 10:47:12.677000 audit: BPF prog-id=22 op=LOAD May 15 10:47:12.677000 audit: BPF prog-id=7 op=UNLOAD May 15 10:47:12.677000 audit: BPF prog-id=8 op=UNLOAD May 15 10:47:12.678335 systemd[1]: Starting systemd-udevd.service... May 15 10:47:12.693002 systemd-udevd[1019]: Using default interface naming scheme 'v252'. May 15 10:47:12.704158 systemd[1]: Started systemd-udevd.service. May 15 10:47:12.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.711000 audit: BPF prog-id=23 op=LOAD May 15 10:47:12.712209 systemd[1]: Starting systemd-networkd.service... May 15 10:47:12.715000 audit: BPF prog-id=24 op=LOAD May 15 10:47:12.715000 audit: BPF prog-id=25 op=LOAD May 15 10:47:12.716507 systemd[1]: Starting systemd-userdbd.service... May 15 10:47:12.715000 audit: BPF prog-id=26 op=LOAD May 15 10:47:12.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.743426 systemd[1]: Started systemd-userdbd.service. May 15 10:47:12.744953 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 10:47:12.755081 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:47:12.775537 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 10:47:12.780451 kernel: ACPI: button: Power Button [PWRF] May 15 10:47:12.787874 systemd-networkd[1037]: lo: Link UP May 15 10:47:12.787885 systemd-networkd[1037]: lo: Gained carrier May 15 10:47:12.788256 systemd-networkd[1037]: Enumeration completed May 15 10:47:12.788357 systemd[1]: Started systemd-networkd.service. May 15 10:47:12.788000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.789460 systemd-networkd[1037]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:47:12.790317 systemd-networkd[1037]: eth0: Link UP May 15 10:47:12.790328 systemd-networkd[1037]: eth0: Gained carrier May 15 10:47:12.789000 audit[1027]: AVC avc: denied { confidentiality } for pid=1027 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 10:47:12.789000 audit[1027]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=560c719d1450 a1=338ac a2=7f08a0c6cbc5 a3=5 items=110 ppid=1019 pid=1027 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:12.789000 audit: CWD cwd="/" May 15 10:47:12.789000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=1 name=(null) inode=11153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=2 name=(null) inode=11153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=3 name=(null) inode=11154 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=4 name=(null) inode=11153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=5 name=(null) inode=11155 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=6 name=(null) inode=11153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=7 name=(null) inode=11156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=8 name=(null) inode=11156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=9 name=(null) inode=11157 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=10 name=(null) inode=11156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=11 name=(null) inode=11158 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=12 name=(null) inode=11156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=13 name=(null) inode=11159 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=14 name=(null) inode=11156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=15 name=(null) inode=11160 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=16 name=(null) inode=11156 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=17 name=(null) inode=11161 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=18 name=(null) inode=11153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=19 name=(null) inode=11162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=20 name=(null) inode=11162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=21 name=(null) inode=11163 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=22 name=(null) inode=11162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=23 name=(null) inode=11164 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=24 name=(null) inode=11162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=25 name=(null) inode=11165 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=26 name=(null) inode=11162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=27 name=(null) inode=11166 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=28 name=(null) inode=11162 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=29 name=(null) inode=11167 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=30 name=(null) inode=11153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=31 name=(null) inode=11168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=32 name=(null) inode=11168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=33 name=(null) inode=11169 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=34 name=(null) inode=11168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=35 name=(null) inode=11170 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=36 name=(null) inode=11168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=37 name=(null) inode=11171 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=38 name=(null) inode=11168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=39 name=(null) inode=11172 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=40 name=(null) inode=11168 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=41 name=(null) inode=11173 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=42 name=(null) inode=11153 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=43 name=(null) inode=11174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=44 name=(null) inode=11174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=45 name=(null) inode=11175 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=46 name=(null) inode=11174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=47 name=(null) inode=11176 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=48 name=(null) inode=11174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=49 name=(null) inode=11177 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=50 name=(null) inode=11174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=51 name=(null) inode=11178 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=52 name=(null) inode=11174 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=53 name=(null) inode=11179 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=55 name=(null) inode=11180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=56 name=(null) inode=11180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=57 name=(null) inode=11181 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=58 name=(null) inode=11180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=59 name=(null) inode=11182 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=60 name=(null) inode=11180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=61 name=(null) inode=11183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=62 name=(null) inode=11183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=63 name=(null) inode=11184 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=64 name=(null) inode=11183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=65 name=(null) inode=11185 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=66 name=(null) inode=11183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=67 name=(null) inode=11186 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=68 name=(null) inode=11183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=69 name=(null) inode=11187 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=70 name=(null) inode=11183 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=71 name=(null) inode=11188 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=72 name=(null) inode=11180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=73 name=(null) inode=11189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=74 name=(null) inode=11189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=75 name=(null) inode=11190 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=76 name=(null) inode=11189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=77 name=(null) inode=11191 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=78 name=(null) inode=11189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=79 name=(null) inode=11192 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=80 name=(null) inode=11189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=81 name=(null) inode=11193 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=82 name=(null) inode=11189 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=83 name=(null) inode=11194 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=84 name=(null) inode=11180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=85 name=(null) inode=11195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=86 name=(null) inode=11195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=87 name=(null) inode=11196 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=88 name=(null) inode=11195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=89 name=(null) inode=11197 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=90 name=(null) inode=11195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=91 name=(null) inode=11198 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=92 name=(null) inode=11195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=93 name=(null) inode=11199 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=94 name=(null) inode=11195 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=95 name=(null) inode=11200 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=96 name=(null) inode=11180 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=97 name=(null) inode=11201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=98 name=(null) inode=11201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=99 name=(null) inode=11202 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=100 name=(null) inode=11201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=101 name=(null) inode=11203 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=102 name=(null) inode=11201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=103 name=(null) inode=11204 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=104 name=(null) inode=11201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=105 name=(null) inode=11205 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=106 name=(null) inode=11201 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=107 name=(null) inode=11206 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PATH item=109 name=(null) inode=15484 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:47:12.789000 audit: PROCTITLE proctitle="(udev-worker)" May 15 10:47:12.802579 systemd-networkd[1037]: eth0: DHCPv4 address 10.0.0.140/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:47:12.809342 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 10:47:12.816600 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 10:47:12.816721 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 10:47:12.816806 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 10:47:12.837456 kernel: mousedev: PS/2 mouse device common for all mice May 15 10:47:12.891969 kernel: kvm: Nested Virtualization enabled May 15 10:47:12.892050 kernel: SVM: kvm: Nested Paging enabled May 15 10:47:12.892085 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 10:47:12.892654 kernel: SVM: Virtual GIF supported May 15 10:47:12.906492 kernel: EDAC MC: Ver: 3.0.0 May 15 10:47:12.934829 systemd[1]: Finished systemd-udev-settle.service. May 15 10:47:12.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.936947 systemd[1]: Starting lvm2-activation-early.service... May 15 10:47:12.943551 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:47:12.970118 systemd[1]: Finished lvm2-activation-early.service. May 15 10:47:12.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:12.971191 systemd[1]: Reached target cryptsetup.target. May 15 10:47:12.972990 systemd[1]: Starting lvm2-activation.service... May 15 10:47:12.975848 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:47:13.001091 systemd[1]: Finished lvm2-activation.service. May 15 10:47:13.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.002045 systemd[1]: Reached target local-fs-pre.target. May 15 10:47:13.002905 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:47:13.002934 systemd[1]: Reached target local-fs.target. May 15 10:47:13.003763 systemd[1]: Reached target machines.target. May 15 10:47:13.005408 systemd[1]: Starting ldconfig.service... May 15 10:47:13.006410 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:47:13.006461 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:47:13.007264 systemd[1]: Starting systemd-boot-update.service... May 15 10:47:13.008974 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:47:13.010767 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:47:13.012631 systemd[1]: Starting systemd-sysext.service... May 15 10:47:13.013677 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) May 15 10:47:13.014524 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:47:13.024074 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:47:13.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.024891 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:47:13.027067 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:47:13.027201 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:47:13.063580 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) May 15 10:47:13.063580 systemd-fsck[1065]: /dev/vda1: 790 files, 120732/258078 clusters May 15 10:47:13.065474 kernel: loop0: detected capacity change from 0 to 205544 May 15 10:47:13.065728 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:47:13.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.069630 systemd[1]: Mounting boot.mount... May 15 10:47:13.294538 systemd[1]: Mounted boot.mount. May 15 10:47:13.303459 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:47:13.307092 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:47:13.307632 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:47:13.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.309940 systemd[1]: Finished systemd-boot-update.service. May 15 10:47:13.310000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.321451 kernel: loop1: detected capacity change from 0 to 205544 May 15 10:47:13.325350 (sd-sysext)[1071]: Using extensions 'kubernetes'. May 15 10:47:13.325765 (sd-sysext)[1071]: Merged extensions into '/usr'. May 15 10:47:13.342827 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:13.344312 systemd[1]: Mounting usr-share-oem.mount... May 15 10:47:13.345511 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:47:13.346817 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:47:13.349122 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:47:13.351414 systemd[1]: Starting modprobe@loop.service... May 15 10:47:13.352469 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:47:13.352601 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:47:13.352701 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:13.355155 systemd[1]: Mounted usr-share-oem.mount. May 15 10:47:13.356598 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:47:13.356707 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:47:13.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.358069 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:47:13.358181 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:47:13.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.358000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.359473 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:47:13.359573 systemd[1]: Finished modprobe@loop.service. May 15 10:47:13.360295 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:47:13.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.360797 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:47:13.360921 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:47:13.361959 systemd[1]: Finished systemd-sysext.service. May 15 10:47:13.362000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.363729 systemd[1]: Starting ensure-sysext.service... May 15 10:47:13.365301 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:47:13.370363 systemd[1]: Reloading. May 15 10:47:13.381210 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:47:13.383281 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:47:13.386526 systemd-tmpfiles[1078]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:47:13.417059 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-05-15T10:47:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:47:13.417089 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-05-15T10:47:13Z" level=info msg="torcx already run" May 15 10:47:13.478540 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:47:13.478554 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:47:13.494966 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:47:13.544000 audit: BPF prog-id=27 op=LOAD May 15 10:47:13.544000 audit: BPF prog-id=18 op=UNLOAD May 15 10:47:13.544000 audit: BPF prog-id=28 op=LOAD May 15 10:47:13.544000 audit: BPF prog-id=29 op=LOAD May 15 10:47:13.544000 audit: BPF prog-id=19 op=UNLOAD May 15 10:47:13.544000 audit: BPF prog-id=20 op=UNLOAD May 15 10:47:13.544000 audit: BPF prog-id=30 op=LOAD May 15 10:47:13.544000 audit: BPF prog-id=24 op=UNLOAD May 15 10:47:13.544000 audit: BPF prog-id=31 op=LOAD May 15 10:47:13.544000 audit: BPF prog-id=32 op=LOAD May 15 10:47:13.544000 audit: BPF prog-id=25 op=UNLOAD May 15 10:47:13.544000 audit: BPF prog-id=26 op=UNLOAD May 15 10:47:13.545000 audit: BPF prog-id=33 op=LOAD May 15 10:47:13.545000 audit: BPF prog-id=23 op=UNLOAD May 15 10:47:13.546000 audit: BPF prog-id=34 op=LOAD May 15 10:47:13.546000 audit: BPF prog-id=35 op=LOAD May 15 10:47:13.546000 audit: BPF prog-id=21 op=UNLOAD May 15 10:47:13.546000 audit: BPF prog-id=22 op=UNLOAD May 15 10:47:13.549851 systemd[1]: Finished ldconfig.service. May 15 10:47:13.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.551606 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:47:13.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.554860 systemd[1]: Starting audit-rules.service... May 15 10:47:13.556349 systemd[1]: Starting clean-ca-certificates.service... May 15 10:47:13.558067 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:47:13.559000 audit: BPF prog-id=36 op=LOAD May 15 10:47:13.560197 systemd[1]: Starting systemd-resolved.service... May 15 10:47:13.561000 audit: BPF prog-id=37 op=LOAD May 15 10:47:13.562600 systemd[1]: Starting systemd-timesyncd.service... May 15 10:47:13.564226 systemd[1]: Starting systemd-update-utmp.service... May 15 10:47:13.568000 audit[1151]: SYSTEM_BOOT pid=1151 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:47:13.569399 systemd[1]: Finished clean-ca-certificates.service. May 15 10:47:13.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.572224 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:47:13.572963 systemd[1]: Finished systemd-update-utmp.service. May 15 10:47:13.573000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.574250 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:47:13.574000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.576685 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:13.576859 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:47:13.577978 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:47:13.579597 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:47:13.581257 systemd[1]: Starting modprobe@loop.service... May 15 10:47:13.582024 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:47:13.582115 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:47:13.583069 systemd[1]: Starting systemd-update-done.service... May 15 10:47:13.583891 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:47:13.583985 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:13.584959 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:47:13.585062 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:47:13.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.586245 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:47:13.586343 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:47:13.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.587498 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:47:13.587593 systemd[1]: Finished modprobe@loop.service. May 15 10:47:13.588000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.588682 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:47:13.588772 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:47:13.590002 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:13.590156 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:47:13.591320 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:47:13.593019 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:47:13.594574 systemd[1]: Starting modprobe@loop.service... May 15 10:47:13.595316 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:47:13.595418 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:47:13.595605 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:47:13.595681 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:13.596447 systemd[1]: Finished systemd-update-done.service. May 15 10:47:13.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.597668 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:47:13.597770 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:47:13.598000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.598946 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:47:13.599040 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:47:13.599000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.600206 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:47:13.600300 systemd[1]: Finished modprobe@loop.service. May 15 10:47:13.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.600000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:13.601380 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:47:13.601622 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:47:13.601000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:47:13.601000 audit[1167]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe619d45e0 a2=420 a3=0 items=0 ppid=1140 pid=1167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:13.601000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:47:13.602112 augenrules[1167]: No rules May 15 10:47:13.603748 systemd[1]: Finished audit-rules.service. May 15 10:47:13.604779 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:13.604953 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:47:13.605948 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:47:13.607856 systemd[1]: Starting modprobe@drm.service... May 15 10:47:13.609653 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:47:13.611411 systemd[1]: Starting modprobe@loop.service... May 15 10:47:13.612243 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:47:13.612351 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:47:13.613415 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:47:13.614415 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:47:13.614564 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:47:13.615615 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:47:13.615721 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:47:13.617548 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:47:13.617648 systemd[1]: Finished modprobe@drm.service. May 15 10:47:13.618783 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:47:13.618879 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:47:13.620002 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:47:13.620097 systemd[1]: Finished modprobe@loop.service. May 15 10:47:13.621285 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:47:13.621369 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:47:13.622419 systemd[1]: Finished ensure-sysext.service. May 15 10:47:13.623776 systemd-resolved[1144]: Positive Trust Anchors: May 15 10:47:13.623789 systemd-resolved[1144]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:47:13.623815 systemd-resolved[1144]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:47:13.628551 systemd[1]: Started systemd-timesyncd.service. May 15 10:47:13.629932 systemd[1]: Reached target time-set.target. May 15 10:47:13.629962 systemd-timesyncd[1150]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:47:13.629997 systemd-timesyncd[1150]: Initial clock synchronization to Thu 2025-05-15 10:47:13.953889 UTC. May 15 10:47:13.630412 systemd-resolved[1144]: Defaulting to hostname 'linux'. May 15 10:47:13.631808 systemd[1]: Started systemd-resolved.service. May 15 10:47:13.632735 systemd[1]: Reached target network.target. May 15 10:47:13.633546 systemd[1]: Reached target nss-lookup.target. May 15 10:47:13.634384 systemd[1]: Reached target sysinit.target. May 15 10:47:13.635258 systemd[1]: Started motdgen.path. May 15 10:47:13.636001 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:47:13.637240 systemd[1]: Started logrotate.timer. May 15 10:47:13.638048 systemd[1]: Started mdadm.timer. May 15 10:47:13.638770 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:47:13.639672 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:47:13.639698 systemd[1]: Reached target paths.target. May 15 10:47:13.640500 systemd[1]: Reached target timers.target. May 15 10:47:13.641639 systemd[1]: Listening on dbus.socket. May 15 10:47:13.643419 systemd[1]: Starting docker.socket... May 15 10:47:13.646087 systemd[1]: Listening on sshd.socket. May 15 10:47:13.646956 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:47:13.647294 systemd[1]: Listening on docker.socket. May 15 10:47:13.648153 systemd[1]: Reached target sockets.target. May 15 10:47:13.648964 systemd[1]: Reached target basic.target. May 15 10:47:13.649781 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:47:13.649806 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:47:13.650628 systemd[1]: Starting containerd.service... May 15 10:47:13.652203 systemd[1]: Starting dbus.service... May 15 10:47:13.653726 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:47:13.655486 systemd[1]: Starting extend-filesystems.service... May 15 10:47:13.656313 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:47:13.657214 systemd[1]: Starting motdgen.service... May 15 10:47:13.658187 jq[1182]: false May 15 10:47:13.658920 systemd[1]: Starting prepare-helm.service... May 15 10:47:13.660604 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:47:13.662318 systemd[1]: Starting sshd-keygen.service... May 15 10:47:13.665704 systemd[1]: Starting systemd-logind.service... May 15 10:47:13.666579 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:47:13.666623 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:47:13.667941 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:47:13.668528 systemd[1]: Starting update-engine.service... May 15 10:47:13.670843 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:47:13.674534 jq[1201]: true May 15 10:47:13.673117 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:47:13.673273 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:47:13.673528 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:47:13.673653 systemd[1]: Finished motdgen.service. May 15 10:47:13.675338 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:47:13.675523 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:47:13.679958 dbus-daemon[1181]: [system] SELinux support is enabled May 15 10:47:13.681049 jq[1205]: true May 15 10:47:13.681531 systemd[1]: Started dbus.service. May 15 10:47:13.684880 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:47:13.684918 systemd[1]: Reached target system-config.target. May 15 10:47:13.685545 tar[1203]: linux-amd64/helm May 15 10:47:13.685978 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:47:13.685999 systemd[1]: Reached target user-config.target. May 15 10:47:13.686853 extend-filesystems[1183]: Found loop1 May 15 10:47:13.687755 extend-filesystems[1183]: Found sr0 May 15 10:47:13.687755 extend-filesystems[1183]: Found vda May 15 10:47:13.687755 extend-filesystems[1183]: Found vda1 May 15 10:47:13.687755 extend-filesystems[1183]: Found vda2 May 15 10:47:13.687755 extend-filesystems[1183]: Found vda3 May 15 10:47:13.687755 extend-filesystems[1183]: Found usr May 15 10:47:13.687755 extend-filesystems[1183]: Found vda4 May 15 10:47:13.687755 extend-filesystems[1183]: Found vda6 May 15 10:47:13.687755 extend-filesystems[1183]: Found vda7 May 15 10:47:13.687755 extend-filesystems[1183]: Found vda9 May 15 10:47:13.687755 extend-filesystems[1183]: Checking size of /dev/vda9 May 15 10:47:13.711463 extend-filesystems[1183]: Resized partition /dev/vda9 May 15 10:47:13.714154 extend-filesystems[1232]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:47:13.716234 env[1206]: time="2025-05-15T10:47:13.716071937Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:47:13.717779 update_engine[1199]: I0515 10:47:13.717403 1199 main.cc:92] Flatcar Update Engine starting May 15 10:47:13.718456 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:47:13.721962 systemd[1]: Started update-engine.service. May 15 10:47:13.728937 update_engine[1199]: I0515 10:47:13.721999 1199 update_check_scheduler.cc:74] Next update check in 5m52s May 15 10:47:13.724298 systemd[1]: Started locksmithd.service. May 15 10:47:13.736124 systemd-logind[1196]: Watching system buttons on /dev/input/event1 (Power Button) May 15 10:47:13.736404 systemd-logind[1196]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 10:47:13.737021 systemd-logind[1196]: New seat seat0. May 15 10:47:13.740227 systemd[1]: Started systemd-logind.service. May 15 10:47:13.757458 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:47:13.760200 env[1206]: time="2025-05-15T10:47:13.760135618Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:47:13.781073 env[1206]: time="2025-05-15T10:47:13.781008089Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:47:13.781286 extend-filesystems[1232]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:47:13.781286 extend-filesystems[1232]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:47:13.781286 extend-filesystems[1232]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:47:13.785359 extend-filesystems[1183]: Resized filesystem in /dev/vda9 May 15 10:47:13.785782 bash[1233]: Updated "/home/core/.ssh/authorized_keys" May 15 10:47:13.785419 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:47:13.787341 env[1206]: time="2025-05-15T10:47:13.787308947Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:47:13.787341 env[1206]: time="2025-05-15T10:47:13.787337551Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:47:13.787609 env[1206]: time="2025-05-15T10:47:13.787576189Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:47:13.787654 env[1206]: time="2025-05-15T10:47:13.787608680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:47:13.787654 env[1206]: time="2025-05-15T10:47:13.787625491Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:47:13.787654 env[1206]: time="2025-05-15T10:47:13.787634789Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:47:13.787759 env[1206]: time="2025-05-15T10:47:13.787729035Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:47:13.787980 env[1206]: time="2025-05-15T10:47:13.787954138Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:47:13.788090 env[1206]: time="2025-05-15T10:47:13.788063783Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:47:13.788090 env[1206]: time="2025-05-15T10:47:13.788083901Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:47:13.788153 env[1206]: time="2025-05-15T10:47:13.788127272Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:47:13.788153 env[1206]: time="2025-05-15T10:47:13.788137411Z" level=info msg="metadata content store policy set" policy=shared May 15 10:47:13.788615 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:47:13.788747 systemd[1]: Finished extend-filesystems.service. May 15 10:47:13.793942 env[1206]: time="2025-05-15T10:47:13.793912764Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:47:13.793985 env[1206]: time="2025-05-15T10:47:13.793956536Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:47:13.793985 env[1206]: time="2025-05-15T10:47:13.793970082Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:47:13.794024 env[1206]: time="2025-05-15T10:47:13.793995109Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794024 env[1206]: time="2025-05-15T10:47:13.794012241Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794070 env[1206]: time="2025-05-15T10:47:13.794024584Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794070 env[1206]: time="2025-05-15T10:47:13.794036126Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794070 env[1206]: time="2025-05-15T10:47:13.794048639Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794070 env[1206]: time="2025-05-15T10:47:13.794060251Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794147 env[1206]: time="2025-05-15T10:47:13.794072825Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794147 env[1206]: time="2025-05-15T10:47:13.794087332Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794147 env[1206]: time="2025-05-15T10:47:13.794099174Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:47:13.794231 env[1206]: time="2025-05-15T10:47:13.794189764Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:47:13.794292 env[1206]: time="2025-05-15T10:47:13.794268862Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:47:13.794507 env[1206]: time="2025-05-15T10:47:13.794486631Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:47:13.794548 env[1206]: time="2025-05-15T10:47:13.794515325Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794548 env[1206]: time="2025-05-15T10:47:13.794529641Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:47:13.794588 env[1206]: time="2025-05-15T10:47:13.794568935Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794588 env[1206]: time="2025-05-15T10:47:13.794580447Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794632 env[1206]: time="2025-05-15T10:47:13.794591928Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794632 env[1206]: time="2025-05-15T10:47:13.794602568Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794632 env[1206]: time="2025-05-15T10:47:13.794613609Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794632 env[1206]: time="2025-05-15T10:47:13.794624319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794709 env[1206]: time="2025-05-15T10:47:13.794634688Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794709 env[1206]: time="2025-05-15T10:47:13.794648023Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794709 env[1206]: time="2025-05-15T10:47:13.794659375Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:47:13.794771 env[1206]: time="2025-05-15T10:47:13.794753040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794771 env[1206]: time="2025-05-15T10:47:13.794766706Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794811 env[1206]: time="2025-05-15T10:47:13.794777336Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:47:13.794811 env[1206]: time="2025-05-15T10:47:13.794787946Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:47:13.794811 env[1206]: time="2025-05-15T10:47:13.794800289Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:47:13.794811 env[1206]: time="2025-05-15T10:47:13.794809476Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:47:13.794885 env[1206]: time="2025-05-15T10:47:13.794824935Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:47:13.794885 env[1206]: time="2025-05-15T10:47:13.794862856Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:47:13.795042 locksmithd[1236]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:47:13.795273 env[1206]: time="2025-05-15T10:47:13.795028587Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:47:13.795273 env[1206]: time="2025-05-15T10:47:13.795072940Z" level=info msg="Connect containerd service" May 15 10:47:13.795273 env[1206]: time="2025-05-15T10:47:13.795102376Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:47:13.795860 env[1206]: time="2025-05-15T10:47:13.795553392Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:47:13.795860 env[1206]: time="2025-05-15T10:47:13.795783253Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:47:13.795860 env[1206]: time="2025-05-15T10:47:13.795812327Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:47:13.795860 env[1206]: time="2025-05-15T10:47:13.795847183Z" level=info msg="containerd successfully booted in 0.086302s" May 15 10:47:13.795884 systemd[1]: Started containerd.service. May 15 10:47:13.802153 env[1206]: time="2025-05-15T10:47:13.802119157Z" level=info msg="Start subscribing containerd event" May 15 10:47:13.802221 env[1206]: time="2025-05-15T10:47:13.802168630Z" level=info msg="Start recovering state" May 15 10:47:13.802221 env[1206]: time="2025-05-15T10:47:13.802213925Z" level=info msg="Start event monitor" May 15 10:47:13.802264 env[1206]: time="2025-05-15T10:47:13.802222932Z" level=info msg="Start snapshots syncer" May 15 10:47:13.802264 env[1206]: time="2025-05-15T10:47:13.802230927Z" level=info msg="Start cni network conf syncer for default" May 15 10:47:13.802264 env[1206]: time="2025-05-15T10:47:13.802238341Z" level=info msg="Start streaming server" May 15 10:47:14.098137 tar[1203]: linux-amd64/LICENSE May 15 10:47:14.098137 tar[1203]: linux-amd64/README.md May 15 10:47:14.102303 systemd[1]: Finished prepare-helm.service. May 15 10:47:14.146038 systemd-networkd[1037]: eth0: Gained IPv6LL May 15 10:47:14.147555 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:47:14.149037 systemd[1]: Reached target network-online.target. May 15 10:47:14.151584 systemd[1]: Starting kubelet.service... May 15 10:47:14.227330 sshd_keygen[1200]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:47:14.245716 systemd[1]: Finished sshd-keygen.service. May 15 10:47:14.248015 systemd[1]: Starting issuegen.service... May 15 10:47:14.252741 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:47:14.252858 systemd[1]: Finished issuegen.service. May 15 10:47:14.254810 systemd[1]: Starting systemd-user-sessions.service... May 15 10:47:14.260533 systemd[1]: Finished systemd-user-sessions.service. May 15 10:47:14.262722 systemd[1]: Started getty@tty1.service. May 15 10:47:14.264587 systemd[1]: Started serial-getty@ttyS0.service. May 15 10:47:14.265721 systemd[1]: Reached target getty.target. May 15 10:47:15.194517 systemd[1]: Started kubelet.service. May 15 10:47:15.195929 systemd[1]: Reached target multi-user.target. May 15 10:47:15.198070 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:47:15.205219 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:47:15.205381 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:47:15.207528 systemd[1]: Startup finished in 622ms (kernel) + 4.462s (initrd) + 6.028s (userspace) = 11.114s. May 15 10:47:15.760322 kubelet[1261]: E0515 10:47:15.760260 1261 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:47:15.761557 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:47:15.761663 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:47:15.761861 systemd[1]: kubelet.service: Consumed 1.447s CPU time. May 15 10:47:17.696406 systemd[1]: Created slice system-sshd.slice. May 15 10:47:17.697380 systemd[1]: Started sshd@0-10.0.0.140:22-10.0.0.1:43432.service. May 15 10:47:17.731021 sshd[1270]: Accepted publickey for core from 10.0.0.1 port 43432 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:47:17.732709 sshd[1270]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:47:17.740945 systemd-logind[1196]: New session 1 of user core. May 15 10:47:17.741714 systemd[1]: Created slice user-500.slice. May 15 10:47:17.742662 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:47:17.752814 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:47:17.753979 systemd[1]: Starting user@500.service... May 15 10:47:17.756471 (systemd)[1273]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:47:17.823024 systemd[1273]: Queued start job for default target default.target. May 15 10:47:17.823442 systemd[1273]: Reached target paths.target. May 15 10:47:17.823475 systemd[1273]: Reached target sockets.target. May 15 10:47:17.823488 systemd[1273]: Reached target timers.target. May 15 10:47:17.823502 systemd[1273]: Reached target basic.target. May 15 10:47:17.823535 systemd[1273]: Reached target default.target. May 15 10:47:17.823556 systemd[1273]: Startup finished in 61ms. May 15 10:47:17.823640 systemd[1]: Started user@500.service. May 15 10:47:17.824603 systemd[1]: Started session-1.scope. May 15 10:47:17.876016 systemd[1]: Started sshd@1-10.0.0.140:22-10.0.0.1:51646.service. May 15 10:47:17.909835 sshd[1282]: Accepted publickey for core from 10.0.0.1 port 51646 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:47:17.911038 sshd[1282]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:47:17.915298 systemd-logind[1196]: New session 2 of user core. May 15 10:47:17.916521 systemd[1]: Started session-2.scope. May 15 10:47:17.971638 sshd[1282]: pam_unix(sshd:session): session closed for user core May 15 10:47:17.973773 systemd[1]: sshd@1-10.0.0.140:22-10.0.0.1:51646.service: Deactivated successfully. May 15 10:47:17.974311 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:47:17.974831 systemd-logind[1196]: Session 2 logged out. Waiting for processes to exit. May 15 10:47:17.975682 systemd[1]: Started sshd@2-10.0.0.140:22-10.0.0.1:51660.service. May 15 10:47:17.976364 systemd-logind[1196]: Removed session 2. May 15 10:47:18.005714 sshd[1288]: Accepted publickey for core from 10.0.0.1 port 51660 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:47:18.006848 sshd[1288]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:47:18.010068 systemd-logind[1196]: New session 3 of user core. May 15 10:47:18.010906 systemd[1]: Started session-3.scope. May 15 10:47:18.060553 sshd[1288]: pam_unix(sshd:session): session closed for user core May 15 10:47:18.063090 systemd[1]: sshd@2-10.0.0.140:22-10.0.0.1:51660.service: Deactivated successfully. May 15 10:47:18.063675 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:47:18.064175 systemd-logind[1196]: Session 3 logged out. Waiting for processes to exit. May 15 10:47:18.065057 systemd[1]: Started sshd@3-10.0.0.140:22-10.0.0.1:51670.service. May 15 10:47:18.065849 systemd-logind[1196]: Removed session 3. May 15 10:47:18.094974 sshd[1295]: Accepted publickey for core from 10.0.0.1 port 51670 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:47:18.096045 sshd[1295]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:47:18.099075 systemd-logind[1196]: New session 4 of user core. May 15 10:47:18.099824 systemd[1]: Started session-4.scope. May 15 10:47:18.152788 sshd[1295]: pam_unix(sshd:session): session closed for user core May 15 10:47:18.155435 systemd[1]: sshd@3-10.0.0.140:22-10.0.0.1:51670.service: Deactivated successfully. May 15 10:47:18.155964 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:47:18.156406 systemd-logind[1196]: Session 4 logged out. Waiting for processes to exit. May 15 10:47:18.157350 systemd[1]: Started sshd@4-10.0.0.140:22-10.0.0.1:51674.service. May 15 10:47:18.158134 systemd-logind[1196]: Removed session 4. May 15 10:47:18.187463 sshd[1301]: Accepted publickey for core from 10.0.0.1 port 51674 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:47:18.188398 sshd[1301]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:47:18.191374 systemd-logind[1196]: New session 5 of user core. May 15 10:47:18.192085 systemd[1]: Started session-5.scope. May 15 10:47:18.249566 sudo[1305]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:47:18.249816 sudo[1305]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:47:18.256666 dbus-daemon[1181]: \xd0\u001d*ÖšU: received setenforce notice (enforcing=-1823027824) May 15 10:47:18.258511 sudo[1305]: pam_unix(sudo:session): session closed for user root May 15 10:47:18.260187 sshd[1301]: pam_unix(sshd:session): session closed for user core May 15 10:47:18.263142 systemd[1]: sshd@4-10.0.0.140:22-10.0.0.1:51674.service: Deactivated successfully. May 15 10:47:18.263714 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:47:18.264280 systemd-logind[1196]: Session 5 logged out. Waiting for processes to exit. May 15 10:47:18.265443 systemd[1]: Started sshd@5-10.0.0.140:22-10.0.0.1:51678.service. May 15 10:47:18.266638 systemd-logind[1196]: Removed session 5. May 15 10:47:18.295569 sshd[1309]: Accepted publickey for core from 10.0.0.1 port 51678 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:47:18.296670 sshd[1309]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:47:18.300192 systemd-logind[1196]: New session 6 of user core. May 15 10:47:18.301004 systemd[1]: Started session-6.scope. May 15 10:47:18.354772 sudo[1313]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:47:18.354947 sudo[1313]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:47:18.357518 sudo[1313]: pam_unix(sudo:session): session closed for user root May 15 10:47:18.361821 sudo[1312]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:47:18.362059 sudo[1312]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:47:18.369384 systemd[1]: Stopping audit-rules.service... May 15 10:47:18.369000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:47:18.370531 auditctl[1316]: No rules May 15 10:47:18.370899 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:47:18.371072 systemd[1]: Stopped audit-rules.service. May 15 10:47:18.371380 kernel: kauditd_printk_skb: 242 callbacks suppressed May 15 10:47:18.371428 kernel: audit: type=1305 audit(1747306038.369:203): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:47:18.372466 systemd[1]: Starting audit-rules.service... May 15 10:47:18.369000 audit[1316]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd27018030 a2=420 a3=0 items=0 ppid=1 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:18.378215 kernel: audit: type=1300 audit(1747306038.369:203): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd27018030 a2=420 a3=0 items=0 ppid=1 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:18.378275 kernel: audit: type=1327 audit(1747306038.369:203): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:47:18.369000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:47:18.379672 kernel: audit: type=1131 audit(1747306038.369:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:18.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:18.387012 augenrules[1333]: No rules May 15 10:47:18.387479 systemd[1]: Finished audit-rules.service. May 15 10:47:18.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:18.388322 sudo[1312]: pam_unix(sudo:session): session closed for user root May 15 10:47:18.389565 sshd[1309]: pam_unix(sshd:session): session closed for user core May 15 10:47:18.386000 audit[1312]: USER_END pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:18.392180 systemd[1]: sshd@5-10.0.0.140:22-10.0.0.1:51678.service: Deactivated successfully. May 15 10:47:18.392815 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:47:18.393335 systemd-logind[1196]: Session 6 logged out. Waiting for processes to exit. May 15 10:47:18.394435 systemd[1]: Started sshd@6-10.0.0.140:22-10.0.0.1:51680.service. May 15 10:47:18.394987 kernel: audit: type=1130 audit(1747306038.386:205): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:18.395022 kernel: audit: type=1106 audit(1747306038.386:206): pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:18.395037 kernel: audit: type=1104 audit(1747306038.386:207): pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:18.386000 audit[1312]: CRED_DISP pid=1312 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:18.395646 systemd-logind[1196]: Removed session 6. May 15 10:47:18.398266 kernel: audit: type=1106 audit(1747306038.388:208): pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:18.388000 audit[1309]: USER_END pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:18.402818 kernel: audit: type=1104 audit(1747306038.389:209): pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:18.389000 audit[1309]: CRED_DISP pid=1309 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:18.406311 kernel: audit: type=1131 audit(1747306038.390:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.140:22-10.0.0.1:51678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:18.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.140:22-10.0.0.1:51678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:18.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.140:22-10.0.0.1:51680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:18.423000 audit[1339]: USER_ACCT pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:18.425162 sshd[1339]: Accepted publickey for core from 10.0.0.1 port 51680 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:47:18.424000 audit[1339]: CRED_ACQ pid=1339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:18.424000 audit[1339]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec0cad530 a2=3 a3=0 items=0 ppid=1 pid=1339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:18.424000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:47:18.426079 sshd[1339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:47:18.429220 systemd-logind[1196]: New session 7 of user core. May 15 10:47:18.429936 systemd[1]: Started session-7.scope. May 15 10:47:18.432000 audit[1339]: USER_START pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:18.433000 audit[1341]: CRED_ACQ pid=1341 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:18.480000 audit[1342]: USER_ACCT pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:18.481000 audit[1342]: CRED_REFR pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:18.482382 sudo[1342]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:47:18.482597 sudo[1342]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:47:18.482000 audit[1342]: USER_START pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:18.503719 systemd[1]: Starting docker.service... May 15 10:47:18.538585 env[1354]: time="2025-05-15T10:47:18.538542862Z" level=info msg="Starting up" May 15 10:47:18.540204 env[1354]: time="2025-05-15T10:47:18.540182527Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:47:18.540204 env[1354]: time="2025-05-15T10:47:18.540197728Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:47:18.540267 env[1354]: time="2025-05-15T10:47:18.540216374Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:47:18.540267 env[1354]: time="2025-05-15T10:47:18.540225944Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:47:18.541821 env[1354]: time="2025-05-15T10:47:18.541793044Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:47:18.541821 env[1354]: time="2025-05-15T10:47:18.541809229Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:47:18.541914 env[1354]: time="2025-05-15T10:47:18.541822317Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:47:18.541914 env[1354]: time="2025-05-15T10:47:18.541830060Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:47:19.394614 env[1354]: time="2025-05-15T10:47:19.394578419Z" level=info msg="Loading containers: start." May 15 10:47:19.440000 audit[1388]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.440000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd8323d3b0 a2=0 a3=7ffd8323d39c items=0 ppid=1354 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.440000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:47:19.442000 audit[1390]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.442000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff600aa260 a2=0 a3=7fff600aa24c items=0 ppid=1354 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.442000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:47:19.443000 audit[1392]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1392 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.443000 audit[1392]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe832bdcb0 a2=0 a3=7ffe832bdc9c items=0 ppid=1354 pid=1392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.443000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:47:19.446000 audit[1394]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.446000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff8a4ee670 a2=0 a3=7fff8a4ee65c items=0 ppid=1354 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.446000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:47:19.448000 audit[1396]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.448000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc14503760 a2=0 a3=7ffc1450374c items=0 ppid=1354 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.448000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:47:19.466000 audit[1401]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.466000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed036b470 a2=0 a3=7ffed036b45c items=0 ppid=1354 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.466000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:47:19.474000 audit[1403]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.474000 audit[1403]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff250386f0 a2=0 a3=7fff250386dc items=0 ppid=1354 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.474000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:47:19.476000 audit[1405]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.476000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffefa3de1b0 a2=0 a3=7ffefa3de19c items=0 ppid=1354 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.476000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:47:19.477000 audit[1407]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.477000 audit[1407]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc80829230 a2=0 a3=7ffc8082921c items=0 ppid=1354 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.477000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:47:19.484000 audit[1411]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1411 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.484000 audit[1411]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc16ec9d90 a2=0 a3=7ffc16ec9d7c items=0 ppid=1354 pid=1411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.484000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:47:19.491000 audit[1412]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1412 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.491000 audit[1412]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc328bc000 a2=0 a3=7ffc328bbfec items=0 ppid=1354 pid=1412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:47:19.500490 kernel: Initializing XFRM netlink socket May 15 10:47:19.527196 env[1354]: time="2025-05-15T10:47:19.527148941Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:47:19.544000 audit[1420]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.544000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffd5280d820 a2=0 a3=7ffd5280d80c items=0 ppid=1354 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.544000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:47:19.555000 audit[1423]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1423 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.555000 audit[1423]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffd4b2d8b0 a2=0 a3=7fffd4b2d89c items=0 ppid=1354 pid=1423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.555000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:47:19.557000 audit[1426]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.557000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc6beff220 a2=0 a3=7ffc6beff20c items=0 ppid=1354 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.557000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:47:19.559000 audit[1428]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.559000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd4c625c50 a2=0 a3=7ffd4c625c3c items=0 ppid=1354 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.559000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:47:19.560000 audit[1430]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1430 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.560000 audit[1430]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffa7f86e30 a2=0 a3=7fffa7f86e1c items=0 ppid=1354 pid=1430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.560000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:47:19.562000 audit[1432]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1432 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.562000 audit[1432]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff648daea0 a2=0 a3=7fff648dae8c items=0 ppid=1354 pid=1432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.562000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:47:19.563000 audit[1434]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1434 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.563000 audit[1434]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7fff38418620 a2=0 a3=7fff3841860c items=0 ppid=1354 pid=1434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.563000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:47:19.570000 audit[1437]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.570000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fff68b216a0 a2=0 a3=7fff68b2168c items=0 ppid=1354 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.570000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:47:19.571000 audit[1439]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.571000 audit[1439]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffef226ca30 a2=0 a3=7ffef226ca1c items=0 ppid=1354 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.571000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:47:19.574000 audit[1441]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.574000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd0aff58c0 a2=0 a3=7ffd0aff58ac items=0 ppid=1354 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.574000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:47:19.576000 audit[1443]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.576000 audit[1443]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff85ce7040 a2=0 a3=7fff85ce702c items=0 ppid=1354 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.576000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:47:19.578381 systemd-networkd[1037]: docker0: Link UP May 15 10:47:19.587000 audit[1447]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.587000 audit[1447]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5669a670 a2=0 a3=7ffd5669a65c items=0 ppid=1354 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.587000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:47:19.594000 audit[1448]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1448 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:19.594000 audit[1448]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd69cfef10 a2=0 a3=7ffd69cfeefc items=0 ppid=1354 pid=1448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:19.594000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:47:19.594839 env[1354]: time="2025-05-15T10:47:19.594802413Z" level=info msg="Loading containers: done." May 15 10:47:19.610564 env[1354]: time="2025-05-15T10:47:19.610508651Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:47:19.610778 env[1354]: time="2025-05-15T10:47:19.610703709Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:47:19.610778 env[1354]: time="2025-05-15T10:47:19.610774602Z" level=info msg="Daemon has completed initialization" May 15 10:47:19.873313 systemd[1]: Started docker.service. May 15 10:47:19.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:19.878708 env[1354]: time="2025-05-15T10:47:19.878653071Z" level=info msg="API listen on /run/docker.sock" May 15 10:47:20.557627 env[1206]: time="2025-05-15T10:47:20.557582456Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 15 10:47:21.230856 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2164234871.mount: Deactivated successfully. May 15 10:47:22.560243 env[1206]: time="2025-05-15T10:47:22.560179917Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:22.562126 env[1206]: time="2025-05-15T10:47:22.562095959Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:22.563834 env[1206]: time="2025-05-15T10:47:22.563771566Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:22.567414 env[1206]: time="2025-05-15T10:47:22.567378237Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:22.568625 env[1206]: time="2025-05-15T10:47:22.568559474Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 15 10:47:22.570130 env[1206]: time="2025-05-15T10:47:22.570064809Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 15 10:47:24.659929 env[1206]: time="2025-05-15T10:47:24.659877859Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:24.661751 env[1206]: time="2025-05-15T10:47:24.661724543Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:24.663402 env[1206]: time="2025-05-15T10:47:24.663378954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:24.664971 env[1206]: time="2025-05-15T10:47:24.664932038Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:24.665652 env[1206]: time="2025-05-15T10:47:24.665624676Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 15 10:47:24.666053 env[1206]: time="2025-05-15T10:47:24.666024168Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 15 10:47:26.012688 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:47:26.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:26.012882 systemd[1]: Stopped kubelet.service. May 15 10:47:26.012931 systemd[1]: kubelet.service: Consumed 1.447s CPU time. May 15 10:47:26.013763 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 10:47:26.013811 kernel: audit: type=1130 audit(1747306046.012:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:26.014028 systemd[1]: Starting kubelet.service... May 15 10:47:26.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:26.020283 kernel: audit: type=1131 audit(1747306046.012:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:26.098074 systemd[1]: Started kubelet.service. May 15 10:47:26.097000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:26.102502 kernel: audit: type=1130 audit(1747306046.097:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:26.133499 kubelet[1490]: E0515 10:47:26.133424 1490 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:47:26.136095 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:47:26.136198 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:47:26.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:47:26.140478 kernel: audit: type=1131 audit(1747306046.135:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:47:26.995769 env[1206]: time="2025-05-15T10:47:26.995699664Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:26.997753 env[1206]: time="2025-05-15T10:47:26.997706840Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:26.999696 env[1206]: time="2025-05-15T10:47:26.999649876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:27.001974 env[1206]: time="2025-05-15T10:47:27.001936618Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:27.002515 env[1206]: time="2025-05-15T10:47:27.002480324Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 15 10:47:27.003020 env[1206]: time="2025-05-15T10:47:27.002992810Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 15 10:47:28.006345 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount534188528.mount: Deactivated successfully. May 15 10:47:29.526645 env[1206]: time="2025-05-15T10:47:29.526583714Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:29.528265 env[1206]: time="2025-05-15T10:47:29.528233307Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:29.529984 env[1206]: time="2025-05-15T10:47:29.529933439Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:29.531135 env[1206]: time="2025-05-15T10:47:29.531098021Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:29.531516 env[1206]: time="2025-05-15T10:47:29.531479838Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 15 10:47:29.531958 env[1206]: time="2025-05-15T10:47:29.531937428Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 10:47:30.030684 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3505854440.mount: Deactivated successfully. May 15 10:47:30.967599 env[1206]: time="2025-05-15T10:47:30.967531623Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:30.969767 env[1206]: time="2025-05-15T10:47:30.969703825Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:30.971803 env[1206]: time="2025-05-15T10:47:30.971762252Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:30.973445 env[1206]: time="2025-05-15T10:47:30.973395544Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:30.974076 env[1206]: time="2025-05-15T10:47:30.974050091Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 10:47:30.974664 env[1206]: time="2025-05-15T10:47:30.974638328Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 10:47:31.382979 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1494208790.mount: Deactivated successfully. May 15 10:47:31.388348 env[1206]: time="2025-05-15T10:47:31.388291316Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:31.390197 env[1206]: time="2025-05-15T10:47:31.390160374Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:31.391539 env[1206]: time="2025-05-15T10:47:31.391504283Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:31.392920 env[1206]: time="2025-05-15T10:47:31.392892219Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:31.393354 env[1206]: time="2025-05-15T10:47:31.393315754Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 15 10:47:31.393877 env[1206]: time="2025-05-15T10:47:31.393820037Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 15 10:47:31.931171 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount456409984.mount: Deactivated successfully. May 15 10:47:35.515333 env[1206]: time="2025-05-15T10:47:35.515244835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:35.517623 env[1206]: time="2025-05-15T10:47:35.517581634Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:35.519713 env[1206]: time="2025-05-15T10:47:35.519652545Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:35.521564 env[1206]: time="2025-05-15T10:47:35.521529851Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:35.522718 env[1206]: time="2025-05-15T10:47:35.522676622Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 15 10:47:36.387094 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. May 15 10:47:36.387316 systemd[1]: Stopped kubelet.service. May 15 10:47:36.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:36.388812 systemd[1]: Starting kubelet.service... May 15 10:47:36.393680 kernel: audit: type=1130 audit(1747306056.386:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:36.393814 kernel: audit: type=1131 audit(1747306056.386:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:36.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:36.462856 systemd[1]: Started kubelet.service. May 15 10:47:36.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:36.467464 kernel: audit: type=1130 audit(1747306056.462:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:36.502846 kubelet[1521]: E0515 10:47:36.502803 1521 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:47:36.504293 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:47:36.504409 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:47:36.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:47:36.508466 kernel: audit: type=1131 audit(1747306056.504:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:47:37.817170 systemd[1]: Stopped kubelet.service. May 15 10:47:37.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:37.818919 systemd[1]: Starting kubelet.service... May 15 10:47:37.823425 kernel: audit: type=1130 audit(1747306057.815:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:37.823494 kernel: audit: type=1131 audit(1747306057.815:254): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:37.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:37.836368 systemd[1]: Reloading. May 15 10:47:37.900355 /usr/lib/systemd/system-generators/torcx-generator[1556]: time="2025-05-15T10:47:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:47:37.900377 /usr/lib/systemd/system-generators/torcx-generator[1556]: time="2025-05-15T10:47:37Z" level=info msg="torcx already run" May 15 10:47:38.690645 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:47:38.690661 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:47:38.707105 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:47:38.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.770232 kernel: audit: type=1400 audit(1747306058.763:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.770266 kernel: audit: type=1400 audit(1747306058.763:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.770291 kernel: audit: type=1400 audit(1747306058.763:257): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.773046 kernel: audit: type=1400 audit(1747306058.763:258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit: BPF prog-id=43 op=LOAD May 15 10:47:38.768000 audit: BPF prog-id=27 op=UNLOAD May 15 10:47:38.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit: BPF prog-id=44 op=LOAD May 15 10:47:38.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.774000 audit: BPF prog-id=45 op=LOAD May 15 10:47:38.774000 audit: BPF prog-id=28 op=UNLOAD May 15 10:47:38.774000 audit: BPF prog-id=29 op=UNLOAD May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit: BPF prog-id=46 op=LOAD May 15 10:47:38.775000 audit: BPF prog-id=30 op=UNLOAD May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit: BPF prog-id=47 op=LOAD May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.775000 audit: BPF prog-id=48 op=LOAD May 15 10:47:38.775000 audit: BPF prog-id=31 op=UNLOAD May 15 10:47:38.775000 audit: BPF prog-id=32 op=UNLOAD May 15 10:47:38.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.776000 audit: BPF prog-id=49 op=LOAD May 15 10:47:38.776000 audit: BPF prog-id=33 op=UNLOAD May 15 10:47:38.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit: BPF prog-id=50 op=LOAD May 15 10:47:38.778000 audit: BPF prog-id=37 op=UNLOAD May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit: BPF prog-id=51 op=LOAD May 15 10:47:38.778000 audit: BPF prog-id=41 op=UNLOAD May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit: BPF prog-id=52 op=LOAD May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.778000 audit: BPF prog-id=53 op=LOAD May 15 10:47:38.778000 audit: BPF prog-id=34 op=UNLOAD May 15 10:47:38.778000 audit: BPF prog-id=35 op=UNLOAD May 15 10:47:38.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.779000 audit: BPF prog-id=54 op=LOAD May 15 10:47:38.779000 audit: BPF prog-id=36 op=UNLOAD May 15 10:47:38.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit: BPF prog-id=55 op=LOAD May 15 10:47:38.781000 audit: BPF prog-id=38 op=UNLOAD May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit: BPF prog-id=56 op=LOAD May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:38.781000 audit: BPF prog-id=57 op=LOAD May 15 10:47:38.781000 audit: BPF prog-id=39 op=UNLOAD May 15 10:47:38.781000 audit: BPF prog-id=40 op=UNLOAD May 15 10:47:38.792722 systemd[1]: Started kubelet.service. May 15 10:47:38.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:38.793813 systemd[1]: Stopping kubelet.service... May 15 10:47:38.794034 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:47:38.794176 systemd[1]: Stopped kubelet.service. May 15 10:47:38.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:38.795513 systemd[1]: Starting kubelet.service... May 15 10:47:38.863806 systemd[1]: Started kubelet.service. May 15 10:47:38.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:38.899288 kubelet[1604]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:47:38.899288 kubelet[1604]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:47:38.899288 kubelet[1604]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:47:38.899709 kubelet[1604]: I0515 10:47:38.899340 1604 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:47:39.500777 kubelet[1604]: I0515 10:47:39.500726 1604 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 10:47:39.500777 kubelet[1604]: I0515 10:47:39.500763 1604 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:47:39.501045 kubelet[1604]: I0515 10:47:39.501023 1604 server.go:929] "Client rotation is on, will bootstrap in background" May 15 10:47:39.519936 kubelet[1604]: I0515 10:47:39.519916 1604 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:47:39.521198 kubelet[1604]: E0515 10:47:39.521169 1604 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.140:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:39.527342 kubelet[1604]: E0515 10:47:39.527295 1604 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:47:39.527342 kubelet[1604]: I0515 10:47:39.527328 1604 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:47:39.531698 kubelet[1604]: I0515 10:47:39.531683 1604 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:47:39.532530 kubelet[1604]: I0515 10:47:39.532508 1604 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 10:47:39.532641 kubelet[1604]: I0515 10:47:39.532608 1604 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:47:39.532792 kubelet[1604]: I0515 10:47:39.532634 1604 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:47:39.532876 kubelet[1604]: I0515 10:47:39.532796 1604 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:47:39.532876 kubelet[1604]: I0515 10:47:39.532804 1604 container_manager_linux.go:300] "Creating device plugin manager" May 15 10:47:39.532926 kubelet[1604]: I0515 10:47:39.532886 1604 state_mem.go:36] "Initialized new in-memory state store" May 15 10:47:39.536133 kubelet[1604]: I0515 10:47:39.536108 1604 kubelet.go:408] "Attempting to sync node with API server" May 15 10:47:39.536133 kubelet[1604]: I0515 10:47:39.536128 1604 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:47:39.536208 kubelet[1604]: I0515 10:47:39.536166 1604 kubelet.go:314] "Adding apiserver pod source" May 15 10:47:39.536208 kubelet[1604]: I0515 10:47:39.536178 1604 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:47:39.551306 kubelet[1604]: W0515 10:47:39.551256 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.140:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.140:6443: connect: connection refused May 15 10:47:39.551379 kubelet[1604]: E0515 10:47:39.551309 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.140:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:39.555048 kubelet[1604]: W0515 10:47:39.555011 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.140:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.140:6443: connect: connection refused May 15 10:47:39.555092 kubelet[1604]: E0515 10:47:39.555049 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.140:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:39.560736 kubelet[1604]: I0515 10:47:39.560707 1604 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:47:39.562253 kubelet[1604]: I0515 10:47:39.562230 1604 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:47:39.562684 kubelet[1604]: W0515 10:47:39.562668 1604 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:47:39.563170 kubelet[1604]: I0515 10:47:39.563156 1604 server.go:1269] "Started kubelet" May 15 10:47:39.563340 kubelet[1604]: I0515 10:47:39.563267 1604 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:47:39.563718 kubelet[1604]: I0515 10:47:39.563683 1604 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:47:39.563873 kubelet[1604]: I0515 10:47:39.563735 1604 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:47:39.562000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:39.562000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:47:39.562000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b10b10 a1=c000a86780 a2=c000b10ae0 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:47:39.562000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:39.562000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:47:39.562000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000111fe0 a1=c000a86798 a2=c000b10ba0 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.562000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:47:39.564377 kubelet[1604]: I0515 10:47:39.564091 1604 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:47:39.564377 kubelet[1604]: I0515 10:47:39.564143 1604 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:47:39.564377 kubelet[1604]: I0515 10:47:39.564200 1604 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:47:39.564503 kubelet[1604]: I0515 10:47:39.564489 1604 server.go:460] "Adding debug handlers to kubelet server" May 15 10:47:39.565232 kubelet[1604]: I0515 10:47:39.565204 1604 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:47:39.565000 audit[1616]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1616 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:39.565000 audit[1616]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fffc691b9c0 a2=0 a3=7fffc691b9ac items=0 ppid=1604 pid=1616 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.565000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:47:39.567511 kubelet[1604]: I0515 10:47:39.566696 1604 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 10:47:39.567511 kubelet[1604]: I0515 10:47:39.566771 1604 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 10:47:39.567511 kubelet[1604]: I0515 10:47:39.566823 1604 reconciler.go:26] "Reconciler: start to sync state" May 15 10:47:39.567511 kubelet[1604]: E0515 10:47:39.566827 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:39.567511 kubelet[1604]: E0515 10:47:39.566878 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.140:6443: connect: connection refused" interval="200ms" May 15 10:47:39.567839 kubelet[1604]: W0515 10:47:39.567771 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.140:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.140:6443: connect: connection refused May 15 10:47:39.567839 kubelet[1604]: E0515 10:47:39.567825 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.140:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:39.566000 audit[1617]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1617 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:39.566000 audit[1617]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd559c0a0 a2=0 a3=7ffdd559c08c items=0 ppid=1604 pid=1617 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.566000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:47:39.568746 kubelet[1604]: I0515 10:47:39.568730 1604 factory.go:221] Registration of the systemd container factory successfully May 15 10:47:39.568813 kubelet[1604]: I0515 10:47:39.568787 1604 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:47:39.571067 kubelet[1604]: E0515 10:47:39.568575 1604 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.140:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.140:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad9a8225e53b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:47:39.563132219 +0000 UTC m=+0.696354731,LastTimestamp:2025-05-15 10:47:39.563132219 +0000 UTC m=+0.696354731,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:47:39.571177 kubelet[1604]: E0515 10:47:39.571134 1604 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:47:39.570000 audit[1619]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1619 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:39.570000 audit[1619]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcb2de46d0 a2=0 a3=7ffcb2de46bc items=0 ppid=1604 pid=1619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.570000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:47:39.571810 kubelet[1604]: I0515 10:47:39.571785 1604 factory.go:221] Registration of the containerd container factory successfully May 15 10:47:39.571000 audit[1621]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1621 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:39.571000 audit[1621]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff8f6a86e0 a2=0 a3=7fff8f6a86cc items=0 ppid=1604 pid=1621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.571000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:47:39.577000 audit[1626]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1626 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:39.577000 audit[1626]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffd10c97b40 a2=0 a3=7ffd10c97b2c items=0 ppid=1604 pid=1626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.577000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:47:39.579015 kubelet[1604]: I0515 10:47:39.578971 1604 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:47:39.578000 audit[1628]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1628 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:39.578000 audit[1628]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe6ba72380 a2=0 a3=7ffe6ba7236c items=0 ppid=1604 pid=1628 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.578000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:47:39.580000 audit[1629]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1629 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:39.580000 audit[1631]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1631 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:39.580000 audit[1631]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc4cdd2eb0 a2=0 a3=7ffc4cdd2e9c items=0 ppid=1604 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.580000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:47:39.580000 audit[1629]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc47a673f0 a2=0 a3=7ffc47a673dc items=0 ppid=1604 pid=1629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.580000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:47:39.582686 kubelet[1604]: I0515 10:47:39.582672 1604 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:47:39.582787 kubelet[1604]: I0515 10:47:39.582774 1604 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:47:39.582865 kubelet[1604]: I0515 10:47:39.582851 1604 kubelet.go:2321] "Starting kubelet main sync loop" May 15 10:47:39.581000 audit[1633]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1633 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:39.581000 audit[1633]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd1ab6fc0 a2=0 a3=7ffdd1ab6fac items=0 ppid=1604 pid=1633 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.581000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:47:39.583081 kubelet[1604]: E0515 10:47:39.583062 1604 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:47:39.583624 kubelet[1604]: W0515 10:47:39.583597 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.140:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.140:6443: connect: connection refused May 15 10:47:39.582000 audit[1634]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1634 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:39.582000 audit[1634]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc6a40a420 a2=0 a3=7ffc6a40a40c items=0 ppid=1604 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:47:39.583854 kubelet[1604]: E0515 10:47:39.583704 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.140:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:39.582000 audit[1635]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1635 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:39.582000 audit[1635]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd93863210 a2=0 a3=7ffd938631fc items=0 ppid=1604 pid=1635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:47:39.584596 kubelet[1604]: I0515 10:47:39.584575 1604 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:47:39.584596 kubelet[1604]: I0515 10:47:39.584586 1604 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:47:39.584647 kubelet[1604]: I0515 10:47:39.584604 1604 state_mem.go:36] "Initialized new in-memory state store" May 15 10:47:39.583000 audit[1636]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1636 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:39.583000 audit[1636]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffde00b1400 a2=0 a3=7ffde00b13ec items=0 ppid=1604 pid=1636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:47:39.667524 kubelet[1604]: E0515 10:47:39.667479 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:39.683870 kubelet[1604]: E0515 10:47:39.683837 1604 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:47:39.767497 kubelet[1604]: E0515 10:47:39.767381 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.140:6443: connect: connection refused" interval="400ms" May 15 10:47:39.767604 kubelet[1604]: E0515 10:47:39.767593 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:39.810939 kubelet[1604]: I0515 10:47:39.810893 1604 policy_none.go:49] "None policy: Start" May 15 10:47:39.811567 kubelet[1604]: I0515 10:47:39.811550 1604 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:47:39.811624 kubelet[1604]: I0515 10:47:39.811571 1604 state_mem.go:35] "Initializing new in-memory state store" May 15 10:47:39.817049 systemd[1]: Created slice kubepods.slice. May 15 10:47:39.820352 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:47:39.822513 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:47:39.830974 kubelet[1604]: I0515 10:47:39.830945 1604 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:47:39.830000 audit[1604]: AVC avc: denied { mac_admin } for pid=1604 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:39.830000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:47:39.830000 audit[1604]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005c4c90 a1=c000ec8fd8 a2=c0005c4c60 a3=25 items=0 ppid=1 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:39.830000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:47:39.831194 kubelet[1604]: I0515 10:47:39.831016 1604 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:47:39.831194 kubelet[1604]: I0515 10:47:39.831128 1604 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:47:39.831194 kubelet[1604]: I0515 10:47:39.831138 1604 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:47:39.831404 kubelet[1604]: I0515 10:47:39.831354 1604 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:47:39.832282 kubelet[1604]: E0515 10:47:39.832252 1604 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:47:39.890079 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 15 10:47:39.897812 systemd[1]: Created slice kubepods-burstable-podd979d46b2a4c5cb0a5e249ec80218bda.slice. May 15 10:47:39.904825 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 15 10:47:39.932749 kubelet[1604]: I0515 10:47:39.932728 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:47:39.933049 kubelet[1604]: E0515 10:47:39.933022 1604 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.140:6443/api/v1/nodes\": dial tcp 10.0.0.140:6443: connect: connection refused" node="localhost" May 15 10:47:39.968409 kubelet[1604]: I0515 10:47:39.968379 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:39.968409 kubelet[1604]: I0515 10:47:39.968411 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:39.968608 kubelet[1604]: I0515 10:47:39.968447 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 15 10:47:39.968608 kubelet[1604]: I0515 10:47:39.968464 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d979d46b2a4c5cb0a5e249ec80218bda-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d979d46b2a4c5cb0a5e249ec80218bda\") " pod="kube-system/kube-apiserver-localhost" May 15 10:47:39.968608 kubelet[1604]: I0515 10:47:39.968477 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d979d46b2a4c5cb0a5e249ec80218bda-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d979d46b2a4c5cb0a5e249ec80218bda\") " pod="kube-system/kube-apiserver-localhost" May 15 10:47:39.968608 kubelet[1604]: I0515 10:47:39.968527 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d979d46b2a4c5cb0a5e249ec80218bda-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d979d46b2a4c5cb0a5e249ec80218bda\") " pod="kube-system/kube-apiserver-localhost" May 15 10:47:39.968608 kubelet[1604]: I0515 10:47:39.968551 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:39.968715 kubelet[1604]: I0515 10:47:39.968565 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:39.968715 kubelet[1604]: I0515 10:47:39.968578 1604 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:40.134668 kubelet[1604]: I0515 10:47:40.134581 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:47:40.134953 kubelet[1604]: E0515 10:47:40.134910 1604 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.140:6443/api/v1/nodes\": dial tcp 10.0.0.140:6443: connect: connection refused" node="localhost" May 15 10:47:40.168533 kubelet[1604]: E0515 10:47:40.168495 1604 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.140:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.140:6443: connect: connection refused" interval="800ms" May 15 10:47:40.196967 kubelet[1604]: E0515 10:47:40.196935 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:40.197559 env[1206]: time="2025-05-15T10:47:40.197519749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 15 10:47:40.203745 kubelet[1604]: E0515 10:47:40.203718 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:40.204152 env[1206]: time="2025-05-15T10:47:40.204112502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d979d46b2a4c5cb0a5e249ec80218bda,Namespace:kube-system,Attempt:0,}" May 15 10:47:40.206264 kubelet[1604]: E0515 10:47:40.206227 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:40.206491 env[1206]: time="2025-05-15T10:47:40.206453579Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 15 10:47:40.501731 kubelet[1604]: E0515 10:47:40.501533 1604 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.140:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.140:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad9a8225e53b default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:47:39.563132219 +0000 UTC m=+0.696354731,LastTimestamp:2025-05-15 10:47:39.563132219 +0000 UTC m=+0.696354731,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:47:40.536875 kubelet[1604]: I0515 10:47:40.536833 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:47:40.537232 kubelet[1604]: E0515 10:47:40.537191 1604 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.140:6443/api/v1/nodes\": dial tcp 10.0.0.140:6443: connect: connection refused" node="localhost" May 15 10:47:40.608825 kubelet[1604]: W0515 10:47:40.608752 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.140:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.140:6443: connect: connection refused May 15 10:47:40.608825 kubelet[1604]: E0515 10:47:40.608821 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.140:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:40.615337 kubelet[1604]: W0515 10:47:40.615302 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.140:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.140:6443: connect: connection refused May 15 10:47:40.615337 kubelet[1604]: E0515 10:47:40.615326 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.140:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:40.705941 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount961964157.mount: Deactivated successfully. May 15 10:47:40.712343 env[1206]: time="2025-05-15T10:47:40.712296020Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.715115 env[1206]: time="2025-05-15T10:47:40.715077064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.716610 env[1206]: time="2025-05-15T10:47:40.716583930Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.717464 env[1206]: time="2025-05-15T10:47:40.717403133Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.719154 env[1206]: time="2025-05-15T10:47:40.719113276Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.720352 env[1206]: time="2025-05-15T10:47:40.720323263Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.721492 env[1206]: time="2025-05-15T10:47:40.721459128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.722063 env[1206]: time="2025-05-15T10:47:40.722033414Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.723984 env[1206]: time="2025-05-15T10:47:40.723921575Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.725655 env[1206]: time="2025-05-15T10:47:40.725624945Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.726897 env[1206]: time="2025-05-15T10:47:40.726865848Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.728117 env[1206]: time="2025-05-15T10:47:40.728075976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:47:40.745689 env[1206]: time="2025-05-15T10:47:40.745610112Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:47:40.745689 env[1206]: time="2025-05-15T10:47:40.745651301Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:47:40.745689 env[1206]: time="2025-05-15T10:47:40.745661473Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:47:40.745976 env[1206]: time="2025-05-15T10:47:40.745909931Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/943f812844d3e2d6b70ae231fa044774ed92c472014c5c4a00437e4cc301e777 pid=1645 runtime=io.containerd.runc.v2 May 15 10:47:40.758199 systemd[1]: Started cri-containerd-943f812844d3e2d6b70ae231fa044774ed92c472014c5c4a00437e4cc301e777.scope. May 15 10:47:40.759630 env[1206]: time="2025-05-15T10:47:40.759568457Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:47:40.759731 env[1206]: time="2025-05-15T10:47:40.759707522Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:47:40.759840 env[1206]: time="2025-05-15T10:47:40.759816974Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:47:40.760086 env[1206]: time="2025-05-15T10:47:40.760059273Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed0a99ca8ba26c7b0ad0b3c682069de7c0bf0cf027c93b0c78d23d04f2f0bdda pid=1673 runtime=io.containerd.runc.v2 May 15 10:47:40.761897 env[1206]: time="2025-05-15T10:47:40.760828530Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:47:40.761897 env[1206]: time="2025-05-15T10:47:40.760861564Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:47:40.761897 env[1206]: time="2025-05-15T10:47:40.760871595Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:47:40.761897 env[1206]: time="2025-05-15T10:47:40.760994631Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2648ceecf4402741161b5c12342550884e1a620e7d2a87bc92f74fb85014e94e pid=1683 runtime=io.containerd.runc.v2 May 15 10:47:40.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.769000 audit: BPF prog-id=58 op=LOAD May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336638313238343464336532643662373061653233316661303434 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336638313238343464336532643662373061653233316661303434 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit: BPF prog-id=59 op=LOAD May 15 10:47:40.770000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000287c60 items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336638313238343464336532643662373061653233316661303434 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit: BPF prog-id=60 op=LOAD May 15 10:47:40.770000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000287ca8 items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336638313238343464336532643662373061653233316661303434 May 15 10:47:40.770000 audit: BPF prog-id=60 op=UNLOAD May 15 10:47:40.770000 audit: BPF prog-id=59 op=UNLOAD May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { perfmon } for pid=1654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit[1654]: AVC avc: denied { bpf } for pid=1654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.770000 audit: BPF prog-id=61 op=LOAD May 15 10:47:40.770000 audit[1654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002fe0b8 items=0 ppid=1645 pid=1654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.770000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934336638313238343464336532643662373061653233316661303434 May 15 10:47:40.772306 systemd[1]: Started cri-containerd-ed0a99ca8ba26c7b0ad0b3c682069de7c0bf0cf027c93b0c78d23d04f2f0bdda.scope. May 15 10:47:40.783585 systemd[1]: Started cri-containerd-2648ceecf4402741161b5c12342550884e1a620e7d2a87bc92f74fb85014e94e.scope. May 15 10:47:40.784498 kubelet[1604]: W0515 10:47:40.784254 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.140:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.140:6443: connect: connection refused May 15 10:47:40.784498 kubelet[1604]: E0515 10:47:40.784323 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.140:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.785000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.785000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit: BPF prog-id=62 op=LOAD May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1673 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564306139396361386261323663376230616430623363363832303639 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1673 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564306139396361386261323663376230616430623363363832303639 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit: BPF prog-id=63 op=LOAD May 15 10:47:40.786000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00021f040 items=0 ppid=1673 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564306139396361386261323663376230616430623363363832303639 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit: BPF prog-id=64 op=LOAD May 15 10:47:40.786000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00021f088 items=0 ppid=1673 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564306139396361386261323663376230616430623363363832303639 May 15 10:47:40.786000 audit: BPF prog-id=64 op=UNLOAD May 15 10:47:40.786000 audit: BPF prog-id=63 op=UNLOAD May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { perfmon } for pid=1698 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit[1698]: AVC avc: denied { bpf } for pid=1698 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.786000 audit: BPF prog-id=65 op=LOAD May 15 10:47:40.786000 audit[1698]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00021f498 items=0 ppid=1673 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.786000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564306139396361386261323663376230616430623363363832303639 May 15 10:47:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit: BPF prog-id=66 op=LOAD May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1683 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343863656563663434303237343131363162356331323334323535 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1683 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343863656563663434303237343131363162356331323334323535 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit: BPF prog-id=67 op=LOAD May 15 10:47:40.794000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002197c0 items=0 ppid=1683 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343863656563663434303237343131363162356331323334323535 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit: BPF prog-id=68 op=LOAD May 15 10:47:40.794000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000219808 items=0 ppid=1683 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343863656563663434303237343131363162356331323334323535 May 15 10:47:40.794000 audit: BPF prog-id=68 op=UNLOAD May 15 10:47:40.794000 audit: BPF prog-id=67 op=UNLOAD May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { perfmon } for pid=1699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit[1699]: AVC avc: denied { bpf } for pid=1699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.794000 audit: BPF prog-id=69 op=LOAD May 15 10:47:40.794000 audit[1699]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000219c18 items=0 ppid=1683 pid=1699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3236343863656563663434303237343131363162356331323334323535 May 15 10:47:40.797950 env[1206]: time="2025-05-15T10:47:40.797531538Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"943f812844d3e2d6b70ae231fa044774ed92c472014c5c4a00437e4cc301e777\"" May 15 10:47:40.798567 kubelet[1604]: E0515 10:47:40.798544 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:40.800408 env[1206]: time="2025-05-15T10:47:40.800384126Z" level=info msg="CreateContainer within sandbox \"943f812844d3e2d6b70ae231fa044774ed92c472014c5c4a00437e4cc301e777\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:47:40.815572 env[1206]: time="2025-05-15T10:47:40.815524230Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"ed0a99ca8ba26c7b0ad0b3c682069de7c0bf0cf027c93b0c78d23d04f2f0bdda\"" May 15 10:47:40.816290 kubelet[1604]: E0515 10:47:40.816251 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:40.816799 env[1206]: time="2025-05-15T10:47:40.816765735Z" level=info msg="CreateContainer within sandbox \"943f812844d3e2d6b70ae231fa044774ed92c472014c5c4a00437e4cc301e777\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"c8133e52102600e7bcdd251bb32a34c30f40fefaa340eb075189cabd73d50ff6\"" May 15 10:47:40.819542 env[1206]: time="2025-05-15T10:47:40.819523576Z" level=info msg="StartContainer for \"c8133e52102600e7bcdd251bb32a34c30f40fefaa340eb075189cabd73d50ff6\"" May 15 10:47:40.821498 env[1206]: time="2025-05-15T10:47:40.821475275Z" level=info msg="CreateContainer within sandbox \"ed0a99ca8ba26c7b0ad0b3c682069de7c0bf0cf027c93b0c78d23d04f2f0bdda\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:47:40.823781 env[1206]: time="2025-05-15T10:47:40.823668589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d979d46b2a4c5cb0a5e249ec80218bda,Namespace:kube-system,Attempt:0,} returns sandbox id \"2648ceecf4402741161b5c12342550884e1a620e7d2a87bc92f74fb85014e94e\"" May 15 10:47:40.824849 kubelet[1604]: E0515 10:47:40.824814 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:40.827014 env[1206]: time="2025-05-15T10:47:40.826978548Z" level=info msg="CreateContainer within sandbox \"2648ceecf4402741161b5c12342550884e1a620e7d2a87bc92f74fb85014e94e\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:47:40.839419 env[1206]: time="2025-05-15T10:47:40.839380613Z" level=info msg="CreateContainer within sandbox \"ed0a99ca8ba26c7b0ad0b3c682069de7c0bf0cf027c93b0c78d23d04f2f0bdda\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"ac85fd56b3bcd6a49a9df0bcfe886877e2e50170fa1ebedf6ab6fe0625cf9200\"" May 15 10:47:40.841680 env[1206]: time="2025-05-15T10:47:40.840002981Z" level=info msg="StartContainer for \"ac85fd56b3bcd6a49a9df0bcfe886877e2e50170fa1ebedf6ab6fe0625cf9200\"" May 15 10:47:40.840028 systemd[1]: Started cri-containerd-c8133e52102600e7bcdd251bb32a34c30f40fefaa340eb075189cabd73d50ff6.scope. May 15 10:47:40.849103 env[1206]: time="2025-05-15T10:47:40.849068271Z" level=info msg="CreateContainer within sandbox \"2648ceecf4402741161b5c12342550884e1a620e7d2a87bc92f74fb85014e94e\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"9980054da983dd1c92815db73c58ce9f694d8ccfe0fdb209687b94e6dbd7638d\"" May 15 10:47:40.849972 env[1206]: time="2025-05-15T10:47:40.849937261Z" level=info msg="StartContainer for \"9980054da983dd1c92815db73c58ce9f694d8ccfe0fdb209687b94e6dbd7638d\"" May 15 10:47:40.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.852000 audit: BPF prog-id=70 op=LOAD May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313333653532313032363030653762636464323531626233326133 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313333653532313032363030653762636464323531626233326133 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit: BPF prog-id=71 op=LOAD May 15 10:47:40.853000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c00039d320 items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313333653532313032363030653762636464323531626233326133 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit: BPF prog-id=72 op=LOAD May 15 10:47:40.853000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c00039d368 items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313333653532313032363030653762636464323531626233326133 May 15 10:47:40.853000 audit: BPF prog-id=72 op=UNLOAD May 15 10:47:40.853000 audit: BPF prog-id=71 op=UNLOAD May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { perfmon } for pid=1771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit[1771]: AVC avc: denied { bpf } for pid=1771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.853000 audit: BPF prog-id=73 op=LOAD May 15 10:47:40.853000 audit[1771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c00039d778 items=0 ppid=1645 pid=1771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.853000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338313333653532313032363030653762636464323531626233326133 May 15 10:47:40.858961 systemd[1]: Started cri-containerd-ac85fd56b3bcd6a49a9df0bcfe886877e2e50170fa1ebedf6ab6fe0625cf9200.scope. May 15 10:47:40.867368 systemd[1]: Started cri-containerd-9980054da983dd1c92815db73c58ce9f694d8ccfe0fdb209687b94e6dbd7638d.scope. May 15 10:47:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.873000 audit: BPF prog-id=74 op=LOAD May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1673 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383566643536623362636436613439613964663062636665383836 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1673 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383566643536623362636436613439613964663062636665383836 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit: BPF prog-id=75 op=LOAD May 15 10:47:40.874000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001ddb80 items=0 ppid=1673 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383566643536623362636436613439613964663062636665383836 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.874000 audit: BPF prog-id=76 op=LOAD May 15 10:47:40.874000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001ddbc8 items=0 ppid=1673 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383566643536623362636436613439613964663062636665383836 May 15 10:47:40.875000 audit: BPF prog-id=76 op=UNLOAD May 15 10:47:40.875000 audit: BPF prog-id=75 op=UNLOAD May 15 10:47:40.875000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.875000 audit: BPF prog-id=77 op=LOAD May 15 10:47:40.875000 audit[1801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001ddfd8 items=0 ppid=1673 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163383566643536623362636436613439613964663062636665383836 May 15 10:47:40.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit: BPF prog-id=78 op=LOAD May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1683 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383030353464613938336464316339323831356462373363353863 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1683 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383030353464613938336464316339323831356462373363353863 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit: BPF prog-id=79 op=LOAD May 15 10:47:40.881000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000303f80 items=0 ppid=1683 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383030353464613938336464316339323831356462373363353863 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.881000 audit: BPF prog-id=80 op=LOAD May 15 10:47:40.881000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000303fc8 items=0 ppid=1683 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.881000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383030353464613938336464316339323831356462373363353863 May 15 10:47:40.882000 audit: BPF prog-id=80 op=UNLOAD May 15 10:47:40.882000 audit: BPF prog-id=79 op=UNLOAD May 15 10:47:40.882000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { perfmon } for pid=1817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit[1817]: AVC avc: denied { bpf } for pid=1817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:40.882000 audit: BPF prog-id=81 op=LOAD May 15 10:47:40.882000 audit[1817]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0004003d8 items=0 ppid=1683 pid=1817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:40.882000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3939383030353464613938336464316339323831356462373363353863 May 15 10:47:40.884647 env[1206]: time="2025-05-15T10:47:40.884617880Z" level=info msg="StartContainer for \"c8133e52102600e7bcdd251bb32a34c30f40fefaa340eb075189cabd73d50ff6\" returns successfully" May 15 10:47:40.893430 kubelet[1604]: W0515 10:47:40.893226 1604 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.140:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.140:6443: connect: connection refused May 15 10:47:40.893430 kubelet[1604]: E0515 10:47:40.893283 1604 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.140:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.140:6443: connect: connection refused" logger="UnhandledError" May 15 10:47:40.905296 env[1206]: time="2025-05-15T10:47:40.905267918Z" level=info msg="StartContainer for \"9980054da983dd1c92815db73c58ce9f694d8ccfe0fdb209687b94e6dbd7638d\" returns successfully" May 15 10:47:40.906777 env[1206]: time="2025-05-15T10:47:40.906732963Z" level=info msg="StartContainer for \"ac85fd56b3bcd6a49a9df0bcfe886877e2e50170fa1ebedf6ab6fe0625cf9200\" returns successfully" May 15 10:47:41.339181 kubelet[1604]: I0515 10:47:41.339144 1604 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:47:41.589859 kubelet[1604]: E0515 10:47:41.589718 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:41.591899 kubelet[1604]: E0515 10:47:41.591842 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:41.593454 kubelet[1604]: E0515 10:47:41.593428 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:41.745000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.750118 kernel: kauditd_printk_skb: 561 callbacks suppressed May 15 10:47:41.750246 kernel: audit: type=1400 audit(1747306061.745:553): avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.753869 kernel: audit: type=1400 audit(1747306061.745:554): avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.745000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.758719 kernel: audit: type=1300 audit(1747306061.745:554): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d7a020 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:41.745000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000d7a020 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:41.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:41.762838 kernel: audit: type=1327 audit(1747306061.745:554): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:41.762888 kernel: audit: type=1300 audit(1747306061.745:553): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b52390 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:41.745000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b52390 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:41.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:41.771539 kernel: audit: type=1327 audit(1747306061.745:553): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:41.873000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.879876 kernel: audit: type=1400 audit(1747306061.873:555): avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.873000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003653ec0 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:47:41.888845 kernel: audit: type=1300 audit(1747306061.873:555): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003653ec0 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:47:41.888879 kernel: audit: type=1327 audit(1747306061.873:555): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:47:41.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:47:41.873000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.894459 kernel: audit: type=1400 audit(1747306061.873:556): avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.873000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c003653f50 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:47:41.873000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:47:41.890000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.890000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c003694360 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:47:41.890000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:47:41.893000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.893000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=74 a1=c0054e2ac0 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:47:41.893000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:47:41.905000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.905000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c006a8c8c0 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:47:41.905000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:47:41.905000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:41.905000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c003695f50 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:47:41.905000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:47:41.923004 kubelet[1604]: E0515 10:47:41.922951 1604 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 10:47:42.033154 kubelet[1604]: I0515 10:47:42.033091 1604 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 15 10:47:42.033154 kubelet[1604]: E0515 10:47:42.033135 1604 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"localhost\": node \"localhost\" not found" May 15 10:47:42.041752 kubelet[1604]: E0515 10:47:42.041725 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.142810 kubelet[1604]: E0515 10:47:42.142690 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.243527 kubelet[1604]: E0515 10:47:42.243481 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.344239 kubelet[1604]: E0515 10:47:42.344206 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.444807 kubelet[1604]: E0515 10:47:42.444683 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.545721 kubelet[1604]: E0515 10:47:42.545669 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.595286 kubelet[1604]: E0515 10:47:42.595256 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:42.595525 kubelet[1604]: E0515 10:47:42.595503 1604 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:42.646669 kubelet[1604]: E0515 10:47:42.646615 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.747343 kubelet[1604]: E0515 10:47:42.747206 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.847998 kubelet[1604]: E0515 10:47:42.847947 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:42.948517 kubelet[1604]: E0515 10:47:42.948481 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:43.049173 kubelet[1604]: E0515 10:47:43.049046 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:43.150097 kubelet[1604]: E0515 10:47:43.150061 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:43.250706 kubelet[1604]: E0515 10:47:43.250652 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:43.351406 kubelet[1604]: E0515 10:47:43.351271 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:43.451895 kubelet[1604]: E0515 10:47:43.451854 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:43.552756 kubelet[1604]: E0515 10:47:43.552705 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:43.653283 kubelet[1604]: E0515 10:47:43.653183 1604 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:43.828032 systemd[1]: Reloading. May 15 10:47:43.891717 /usr/lib/systemd/system-generators/torcx-generator[1906]: time="2025-05-15T10:47:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:47:43.891745 /usr/lib/systemd/system-generators/torcx-generator[1906]: time="2025-05-15T10:47:43Z" level=info msg="torcx already run" May 15 10:47:43.981410 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:47:43.981427 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:47:43.997642 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit: BPF prog-id=82 op=LOAD May 15 10:47:44.062000 audit: BPF prog-id=43 op=UNLOAD May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit: BPF prog-id=83 op=LOAD May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.062000 audit: BPF prog-id=84 op=LOAD May 15 10:47:44.062000 audit: BPF prog-id=44 op=UNLOAD May 15 10:47:44.062000 audit: BPF prog-id=45 op=UNLOAD May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit: BPF prog-id=85 op=LOAD May 15 10:47:44.063000 audit: BPF prog-id=46 op=UNLOAD May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit: BPF prog-id=86 op=LOAD May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.063000 audit: BPF prog-id=87 op=LOAD May 15 10:47:44.063000 audit: BPF prog-id=47 op=UNLOAD May 15 10:47:44.063000 audit: BPF prog-id=48 op=UNLOAD May 15 10:47:44.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit: BPF prog-id=88 op=LOAD May 15 10:47:44.064000 audit: BPF prog-id=70 op=UNLOAD May 15 10:47:44.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit: BPF prog-id=89 op=LOAD May 15 10:47:44.065000 audit: BPF prog-id=49 op=UNLOAD May 15 10:47:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.065000 audit: BPF prog-id=90 op=LOAD May 15 10:47:44.065000 audit: BPF prog-id=74 op=UNLOAD May 15 10:47:44.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.066000 audit: BPF prog-id=91 op=LOAD May 15 10:47:44.066000 audit: BPF prog-id=78 op=UNLOAD May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit: BPF prog-id=92 op=LOAD May 15 10:47:44.067000 audit: BPF prog-id=50 op=UNLOAD May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.067000 audit: BPF prog-id=93 op=LOAD May 15 10:47:44.067000 audit: BPF prog-id=62 op=UNLOAD May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit: BPF prog-id=94 op=LOAD May 15 10:47:44.068000 audit: BPF prog-id=51 op=UNLOAD May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit: BPF prog-id=95 op=LOAD May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.068000 audit: BPF prog-id=96 op=LOAD May 15 10:47:44.068000 audit: BPF prog-id=52 op=UNLOAD May 15 10:47:44.068000 audit: BPF prog-id=53 op=UNLOAD May 15 10:47:44.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.069000 audit: BPF prog-id=97 op=LOAD May 15 10:47:44.069000 audit: BPF prog-id=54 op=UNLOAD May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit: BPF prog-id=98 op=LOAD May 15 10:47:44.070000 audit: BPF prog-id=55 op=UNLOAD May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit: BPF prog-id=99 op=LOAD May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit: BPF prog-id=100 op=LOAD May 15 10:47:44.071000 audit: BPF prog-id=56 op=UNLOAD May 15 10:47:44.071000 audit: BPF prog-id=57 op=UNLOAD May 15 10:47:44.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.071000 audit: BPF prog-id=101 op=LOAD May 15 10:47:44.071000 audit: BPF prog-id=66 op=UNLOAD May 15 10:47:44.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.072000 audit: BPF prog-id=102 op=LOAD May 15 10:47:44.072000 audit: BPF prog-id=58 op=UNLOAD May 15 10:47:44.083405 systemd[1]: Stopping kubelet.service... May 15 10:47:44.110754 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:47:44.110955 systemd[1]: Stopped kubelet.service. May 15 10:47:44.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:44.112585 systemd[1]: Starting kubelet.service... May 15 10:47:44.186710 systemd[1]: Started kubelet.service. May 15 10:47:44.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:44.229461 kubelet[1952]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:47:44.229461 kubelet[1952]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:47:44.229461 kubelet[1952]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:47:44.229461 kubelet[1952]: I0515 10:47:44.227782 1952 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:47:44.253574 kubelet[1952]: I0515 10:47:44.253443 1952 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 10:47:44.253574 kubelet[1952]: I0515 10:47:44.253483 1952 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:47:44.253926 kubelet[1952]: I0515 10:47:44.253757 1952 server.go:929] "Client rotation is on, will bootstrap in background" May 15 10:47:44.254866 kubelet[1952]: I0515 10:47:44.254844 1952 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:47:44.259493 kubelet[1952]: I0515 10:47:44.259462 1952 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:47:44.261984 kubelet[1952]: E0515 10:47:44.261952 1952 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:47:44.261984 kubelet[1952]: I0515 10:47:44.261978 1952 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:47:44.265134 kubelet[1952]: I0515 10:47:44.265110 1952 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:47:44.265329 kubelet[1952]: I0515 10:47:44.265314 1952 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 10:47:44.265539 kubelet[1952]: I0515 10:47:44.265509 1952 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:47:44.265794 kubelet[1952]: I0515 10:47:44.265607 1952 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:47:44.265922 kubelet[1952]: I0515 10:47:44.265907 1952 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:47:44.265989 kubelet[1952]: I0515 10:47:44.265976 1952 container_manager_linux.go:300] "Creating device plugin manager" May 15 10:47:44.266099 kubelet[1952]: I0515 10:47:44.266086 1952 state_mem.go:36] "Initialized new in-memory state store" May 15 10:47:44.266277 kubelet[1952]: I0515 10:47:44.266265 1952 kubelet.go:408] "Attempting to sync node with API server" May 15 10:47:44.266351 kubelet[1952]: I0515 10:47:44.266338 1952 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:47:44.266457 kubelet[1952]: I0515 10:47:44.266426 1952 kubelet.go:314] "Adding apiserver pod source" May 15 10:47:44.266537 kubelet[1952]: I0515 10:47:44.266521 1952 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:47:44.267737 kubelet[1952]: I0515 10:47:44.267724 1952 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:47:44.268130 kubelet[1952]: I0515 10:47:44.268117 1952 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:47:44.268577 kubelet[1952]: I0515 10:47:44.268566 1952 server.go:1269] "Started kubelet" May 15 10:47:44.272102 kubelet[1952]: I0515 10:47:44.272064 1952 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:47:44.272267 kubelet[1952]: I0515 10:47:44.272186 1952 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:47:44.272513 kubelet[1952]: I0515 10:47:44.272492 1952 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:47:44.273263 kubelet[1952]: I0515 10:47:44.273247 1952 server.go:460] "Adding debug handlers to kubelet server" May 15 10:47:44.275000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.275000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:47:44.275000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0009cd9e0 a1=c000be6480 a2=c0009cd9b0 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:44.275000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:47:44.276000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.276000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:47:44.276000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000bb6700 a1=c000be6498 a2=c0009cda70 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:44.276000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:47:44.277742 kubelet[1952]: I0515 10:47:44.277460 1952 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:47:44.277742 kubelet[1952]: I0515 10:47:44.277516 1952 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:47:44.277742 kubelet[1952]: I0515 10:47:44.277554 1952 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:47:44.278655 kubelet[1952]: I0515 10:47:44.278629 1952 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:47:44.280355 kubelet[1952]: I0515 10:47:44.280319 1952 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 10:47:44.280471 kubelet[1952]: E0515 10:47:44.280427 1952 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:47:44.283780 kubelet[1952]: I0515 10:47:44.283223 1952 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 10:47:44.283780 kubelet[1952]: I0515 10:47:44.283363 1952 reconciler.go:26] "Reconciler: start to sync state" May 15 10:47:44.283780 kubelet[1952]: I0515 10:47:44.283689 1952 factory.go:221] Registration of the systemd container factory successfully May 15 10:47:44.283869 kubelet[1952]: I0515 10:47:44.283797 1952 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:47:44.286358 kubelet[1952]: I0515 10:47:44.286102 1952 factory.go:221] Registration of the containerd container factory successfully May 15 10:47:44.286358 kubelet[1952]: E0515 10:47:44.286330 1952 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:47:44.292804 kubelet[1952]: I0515 10:47:44.292763 1952 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:47:44.296604 kubelet[1952]: I0515 10:47:44.296579 1952 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:47:44.296660 kubelet[1952]: I0515 10:47:44.296615 1952 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:47:44.296660 kubelet[1952]: I0515 10:47:44.296632 1952 kubelet.go:2321] "Starting kubelet main sync loop" May 15 10:47:44.296707 kubelet[1952]: E0515 10:47:44.296669 1952 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:47:44.311953 kubelet[1952]: I0515 10:47:44.311937 1952 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:47:44.312028 kubelet[1952]: I0515 10:47:44.312012 1952 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:47:44.312114 kubelet[1952]: I0515 10:47:44.312101 1952 state_mem.go:36] "Initialized new in-memory state store" May 15 10:47:44.312387 kubelet[1952]: I0515 10:47:44.312326 1952 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:47:44.312444 kubelet[1952]: I0515 10:47:44.312393 1952 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:47:44.312479 kubelet[1952]: I0515 10:47:44.312445 1952 policy_none.go:49] "None policy: Start" May 15 10:47:44.313209 kubelet[1952]: I0515 10:47:44.313184 1952 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:47:44.313253 kubelet[1952]: I0515 10:47:44.313225 1952 state_mem.go:35] "Initializing new in-memory state store" May 15 10:47:44.313455 kubelet[1952]: I0515 10:47:44.313425 1952 state_mem.go:75] "Updated machine memory state" May 15 10:47:44.317028 kubelet[1952]: I0515 10:47:44.317007 1952 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:47:44.315000 audit[1952]: AVC avc: denied { mac_admin } for pid=1952 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:44.315000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:47:44.315000 audit[1952]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c1c240 a1=c000b24570 a2=c000c1c210 a3=25 items=0 ppid=1 pid=1952 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:44.315000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:47:44.317246 kubelet[1952]: I0515 10:47:44.317079 1952 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:47:44.317246 kubelet[1952]: I0515 10:47:44.317214 1952 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:47:44.317246 kubelet[1952]: I0515 10:47:44.317227 1952 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:47:44.317484 kubelet[1952]: I0515 10:47:44.317465 1952 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:47:44.421472 kubelet[1952]: I0515 10:47:44.421444 1952 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:47:44.426606 kubelet[1952]: I0515 10:47:44.426578 1952 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 15 10:47:44.426673 kubelet[1952]: I0515 10:47:44.426646 1952 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 15 10:47:44.584021 kubelet[1952]: I0515 10:47:44.583896 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:44.584021 kubelet[1952]: I0515 10:47:44.583935 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 15 10:47:44.584021 kubelet[1952]: I0515 10:47:44.583953 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d979d46b2a4c5cb0a5e249ec80218bda-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d979d46b2a4c5cb0a5e249ec80218bda\") " pod="kube-system/kube-apiserver-localhost" May 15 10:47:44.584021 kubelet[1952]: I0515 10:47:44.583966 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:44.584021 kubelet[1952]: I0515 10:47:44.583981 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:44.584258 kubelet[1952]: I0515 10:47:44.583994 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:44.584258 kubelet[1952]: I0515 10:47:44.584043 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d979d46b2a4c5cb0a5e249ec80218bda-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d979d46b2a4c5cb0a5e249ec80218bda\") " pod="kube-system/kube-apiserver-localhost" May 15 10:47:44.584258 kubelet[1952]: I0515 10:47:44.584094 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d979d46b2a4c5cb0a5e249ec80218bda-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d979d46b2a4c5cb0a5e249ec80218bda\") " pod="kube-system/kube-apiserver-localhost" May 15 10:47:44.584258 kubelet[1952]: I0515 10:47:44.584114 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:47:44.708126 kubelet[1952]: E0515 10:47:44.708079 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:44.708659 kubelet[1952]: E0515 10:47:44.708631 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:44.708840 kubelet[1952]: E0515 10:47:44.708811 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:45.267774 kubelet[1952]: I0515 10:47:45.267728 1952 apiserver.go:52] "Watching apiserver" May 15 10:47:45.283503 kubelet[1952]: I0515 10:47:45.283474 1952 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 10:47:45.305320 kubelet[1952]: E0515 10:47:45.304871 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:45.305320 kubelet[1952]: E0515 10:47:45.304871 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:45.373343 kubelet[1952]: E0515 10:47:45.372173 1952 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:47:45.373343 kubelet[1952]: E0515 10:47:45.372335 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:45.428199 kubelet[1952]: I0515 10:47:45.428148 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.428129894 podStartE2EDuration="1.428129894s" podCreationTimestamp="2025-05-15 10:47:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:47:45.427994292 +0000 UTC m=+1.237629676" watchObservedRunningTime="2025-05-15 10:47:45.428129894 +0000 UTC m=+1.237765278" May 15 10:47:45.428547 kubelet[1952]: I0515 10:47:45.428492 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.428486392 podStartE2EDuration="1.428486392s" podCreationTimestamp="2025-05-15 10:47:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:47:45.389115556 +0000 UTC m=+1.198750940" watchObservedRunningTime="2025-05-15 10:47:45.428486392 +0000 UTC m=+1.238121776" May 15 10:47:45.450646 kubelet[1952]: I0515 10:47:45.450580 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.450562326 podStartE2EDuration="1.450562326s" podCreationTimestamp="2025-05-15 10:47:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:47:45.437096993 +0000 UTC m=+1.246732378" watchObservedRunningTime="2025-05-15 10:47:45.450562326 +0000 UTC m=+1.260197700" May 15 10:47:46.305862 kubelet[1952]: E0515 10:47:46.305828 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:47.160000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:47:47.163139 kernel: kauditd_printk_skb: 272 callbacks suppressed May 15 10:47:47.163205 kernel: audit: type=1400 audit(1747306067.160:810): avc: denied { watch } for pid=1792 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:47:47.160000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bab740 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:47.173471 kernel: audit: type=1300 audit(1747306067.160:810): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000bab740 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:47.160000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:47.178181 kernel: audit: type=1327 audit(1747306067.160:810): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:49.709401 sudo[1342]: pam_unix(sudo:session): session closed for user root May 15 10:47:49.708000 audit[1342]: USER_END pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:49.708000 audit[1342]: CRED_DISP pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:49.714394 sshd[1339]: pam_unix(sshd:session): session closed for user core May 15 10:47:49.717141 systemd[1]: sshd@6-10.0.0.140:22-10.0.0.1:51680.service: Deactivated successfully. May 15 10:47:49.717467 kernel: audit: type=1106 audit(1747306069.708:811): pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:49.717568 kernel: audit: type=1104 audit(1747306069.708:812): pid=1342 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:47:49.717590 kernel: audit: type=1106 audit(1747306069.714:813): pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:49.714000 audit[1339]: USER_END pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:49.717884 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:47:49.718036 systemd[1]: session-7.scope: Consumed 3.901s CPU time. May 15 10:47:49.718856 systemd-logind[1196]: Session 7 logged out. Waiting for processes to exit. May 15 10:47:49.719570 systemd-logind[1196]: Removed session 7. May 15 10:47:49.714000 audit[1339]: CRED_DISP pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:49.725614 kernel: audit: type=1104 audit(1747306069.714:814): pid=1339 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:47:49.725666 kernel: audit: type=1131 audit(1747306069.715:815): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.140:22-10.0.0.1:51680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:49.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.140:22-10.0.0.1:51680 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:47:49.873000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:49.873000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a735a0 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:49.884457 kernel: audit: type=1400 audit(1747306069.873:816): avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:49.884573 kernel: audit: type=1300 audit(1747306069.873:816): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a735a0 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:49.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:49.875000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:49.875000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bb55e0 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:49.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:49.875000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:49.875000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000bb5640 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:49.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:49.875000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:47:49.875000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000a735e0 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:47:49.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:47:50.044853 kubelet[1952]: E0515 10:47:50.044725 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:50.312575 kubelet[1952]: E0515 10:47:50.312415 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:50.514268 kubelet[1952]: E0515 10:47:50.514232 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:50.929100 kubelet[1952]: I0515 10:47:50.929057 1952 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:47:50.929471 env[1206]: time="2025-05-15T10:47:50.929417390Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:47:50.929825 kubelet[1952]: I0515 10:47:50.929707 1952 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:47:51.234689 kubelet[1952]: E0515 10:47:51.234563 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:51.313869 kubelet[1952]: E0515 10:47:51.313838 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:51.313869 kubelet[1952]: E0515 10:47:51.313880 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:51.781826 systemd[1]: Created slice kubepods-besteffort-pode8ddf456_b969_4bd3_9633_6cbdc50fab9a.slice. May 15 10:47:51.793305 kubelet[1952]: I0515 10:47:51.793265 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e8ddf456-b969-4bd3-9633-6cbdc50fab9a-kube-proxy\") pod \"kube-proxy-5tkqf\" (UID: \"e8ddf456-b969-4bd3-9633-6cbdc50fab9a\") " pod="kube-system/kube-proxy-5tkqf" May 15 10:47:51.793461 kubelet[1952]: I0515 10:47:51.793319 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e8ddf456-b969-4bd3-9633-6cbdc50fab9a-lib-modules\") pod \"kube-proxy-5tkqf\" (UID: \"e8ddf456-b969-4bd3-9633-6cbdc50fab9a\") " pod="kube-system/kube-proxy-5tkqf" May 15 10:47:51.793461 kubelet[1952]: I0515 10:47:51.793359 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m768q\" (UniqueName: \"kubernetes.io/projected/e8ddf456-b969-4bd3-9633-6cbdc50fab9a-kube-api-access-m768q\") pod \"kube-proxy-5tkqf\" (UID: \"e8ddf456-b969-4bd3-9633-6cbdc50fab9a\") " pod="kube-system/kube-proxy-5tkqf" May 15 10:47:51.793461 kubelet[1952]: I0515 10:47:51.793390 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e8ddf456-b969-4bd3-9633-6cbdc50fab9a-xtables-lock\") pod \"kube-proxy-5tkqf\" (UID: \"e8ddf456-b969-4bd3-9633-6cbdc50fab9a\") " pod="kube-system/kube-proxy-5tkqf" May 15 10:47:51.898605 kubelet[1952]: I0515 10:47:51.898564 1952 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 10:47:52.046879 systemd[1]: Created slice kubepods-besteffort-pode23bb82c_8557_4fce_89ae_2ab55cfd9499.slice. May 15 10:47:52.091184 kubelet[1952]: E0515 10:47:52.091137 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:52.092050 env[1206]: time="2025-05-15T10:47:52.091720094Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5tkqf,Uid:e8ddf456-b969-4bd3-9633-6cbdc50fab9a,Namespace:kube-system,Attempt:0,}" May 15 10:47:52.095168 kubelet[1952]: I0515 10:47:52.095112 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9kcb6\" (UniqueName: \"kubernetes.io/projected/e23bb82c-8557-4fce-89ae-2ab55cfd9499-kube-api-access-9kcb6\") pod \"tigera-operator-6f6897fdc5-ztl7b\" (UID: \"e23bb82c-8557-4fce-89ae-2ab55cfd9499\") " pod="tigera-operator/tigera-operator-6f6897fdc5-ztl7b" May 15 10:47:52.095168 kubelet[1952]: I0515 10:47:52.095154 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/e23bb82c-8557-4fce-89ae-2ab55cfd9499-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-ztl7b\" (UID: \"e23bb82c-8557-4fce-89ae-2ab55cfd9499\") " pod="tigera-operator/tigera-operator-6f6897fdc5-ztl7b" May 15 10:47:52.106593 env[1206]: time="2025-05-15T10:47:52.106524004Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:47:52.106593 env[1206]: time="2025-05-15T10:47:52.106568815Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:47:52.106593 env[1206]: time="2025-05-15T10:47:52.106581788Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:47:52.106751 env[1206]: time="2025-05-15T10:47:52.106718666Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d59b559aa50eac745fce7bb61cc6d29a42fcabc6a7bda86b0540a8b8d626ca6 pid=2045 runtime=io.containerd.runc.v2 May 15 10:47:52.122871 systemd[1]: run-containerd-runc-k8s.io-6d59b559aa50eac745fce7bb61cc6d29a42fcabc6a7bda86b0540a8b8d626ca6-runc.bUJc7R.mount: Deactivated successfully. May 15 10:47:52.126588 systemd[1]: Started cri-containerd-6d59b559aa50eac745fce7bb61cc6d29a42fcabc6a7bda86b0540a8b8d626ca6.scope. May 15 10:47:52.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit: BPF prog-id=103 op=LOAD May 15 10:47:52.139000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.139000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2045 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664353962353539616135306561633734356663653762623631636336 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2045 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664353962353539616135306561633734356663653762623631636336 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit: BPF prog-id=104 op=LOAD May 15 10:47:52.140000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d20f0 items=0 ppid=2045 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664353962353539616135306561633734356663653762623631636336 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit: BPF prog-id=105 op=LOAD May 15 10:47:52.140000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d2138 items=0 ppid=2045 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664353962353539616135306561633734356663653762623631636336 May 15 10:47:52.140000 audit: BPF prog-id=105 op=UNLOAD May 15 10:47:52.140000 audit: BPF prog-id=104 op=UNLOAD May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { perfmon } for pid=2055 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit[2055]: AVC avc: denied { bpf } for pid=2055 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.140000 audit: BPF prog-id=106 op=LOAD May 15 10:47:52.140000 audit[2055]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d2548 items=0 ppid=2045 pid=2055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664353962353539616135306561633734356663653762623631636336 May 15 10:47:52.148787 env[1206]: time="2025-05-15T10:47:52.148360402Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5tkqf,Uid:e8ddf456-b969-4bd3-9633-6cbdc50fab9a,Namespace:kube-system,Attempt:0,} returns sandbox id \"6d59b559aa50eac745fce7bb61cc6d29a42fcabc6a7bda86b0540a8b8d626ca6\"" May 15 10:47:52.149249 kubelet[1952]: E0515 10:47:52.149227 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:52.151261 env[1206]: time="2025-05-15T10:47:52.151219659Z" level=info msg="CreateContainer within sandbox \"6d59b559aa50eac745fce7bb61cc6d29a42fcabc6a7bda86b0540a8b8d626ca6\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:47:52.168004 env[1206]: time="2025-05-15T10:47:52.167964153Z" level=info msg="CreateContainer within sandbox \"6d59b559aa50eac745fce7bb61cc6d29a42fcabc6a7bda86b0540a8b8d626ca6\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d68509c1db5602482f04483f36457a1108046bf4883ea0e2671f1655d021e9f4\"" May 15 10:47:52.169411 env[1206]: time="2025-05-15T10:47:52.169390284Z" level=info msg="StartContainer for \"d68509c1db5602482f04483f36457a1108046bf4883ea0e2671f1655d021e9f4\"" May 15 10:47:52.183415 systemd[1]: Started cri-containerd-d68509c1db5602482f04483f36457a1108046bf4883ea0e2671f1655d021e9f4.scope. May 15 10:47:52.205487 kernel: kauditd_printk_skb: 67 callbacks suppressed May 15 10:47:52.205644 kernel: audit: type=1400 audit(1747306072.200:838): avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fcae0170718 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.210951 kernel: audit: type=1300 audit(1747306072.200:838): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7fcae0170718 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383530396331646235363032343832663034343833663336343537 May 15 10:47:52.215125 kernel: audit: type=1327 audit(1747306072.200:838): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383530396331646235363032343832663034343833663336343537 May 15 10:47:52.218228 kernel: audit: type=1400 audit(1747306072.200:839): avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.224554 kernel: audit: type=1400 audit(1747306072.200:839): avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.224614 kernel: audit: type=1400 audit(1747306072.200:839): avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.224631 kernel: audit: type=1400 audit(1747306072.200:839): avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.230314 kernel: audit: type=1400 audit(1747306072.200:839): avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.233326 kernel: audit: type=1400 audit(1747306072.200:839): avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.233386 kernel: audit: type=1400 audit(1747306072.200:839): avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.200000 audit: BPF prog-id=107 op=LOAD May 15 10:47:52.200000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c000211348 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383530396331646235363032343832663034343833663336343537 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit: BPF prog-id=108 op=LOAD May 15 10:47:52.201000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000211398 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383530396331646235363032343832663034343833663336343537 May 15 10:47:52.201000 audit: BPF prog-id=108 op=UNLOAD May 15 10:47:52.201000 audit: BPF prog-id=107 op=UNLOAD May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { perfmon } for pid=2087 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit[2087]: AVC avc: denied { bpf } for pid=2087 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.201000 audit: BPF prog-id=109 op=LOAD May 15 10:47:52.201000 audit[2087]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000211428 items=0 ppid=2045 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6436383530396331646235363032343832663034343833663336343537 May 15 10:47:52.242550 env[1206]: time="2025-05-15T10:47:52.242508356Z" level=info msg="StartContainer for \"d68509c1db5602482f04483f36457a1108046bf4883ea0e2671f1655d021e9f4\" returns successfully" May 15 10:47:52.316291 kubelet[1952]: E0515 10:47:52.316197 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:47:52.325489 kubelet[1952]: I0515 10:47:52.325414 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-5tkqf" podStartSLOduration=1.3253956470000001 podStartE2EDuration="1.325395647s" podCreationTimestamp="2025-05-15 10:47:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:47:52.325309836 +0000 UTC m=+8.134945240" watchObservedRunningTime="2025-05-15 10:47:52.325395647 +0000 UTC m=+8.135031032" May 15 10:47:52.327000 audit[2149]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2149 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.327000 audit[2149]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffd9e0d940 a2=0 a3=7fffd9e0d92c items=0 ppid=2098 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.328000 audit[2150]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2150 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.328000 audit[2150]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcd9304520 a2=0 a3=7ffcd930450c items=0 ppid=2098 pid=2150 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.328000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:47:52.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:47:52.329000 audit[2151]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2151 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.329000 audit[2152]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2152 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.329000 audit[2152]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd857ff600 a2=0 a3=7ffd857ff5ec items=0 ppid=2098 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.329000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:47:52.329000 audit[2151]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd6badca10 a2=0 a3=7ffd6badc9fc items=0 ppid=2098 pid=2151 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:47:52.330000 audit[2154]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2154 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.330000 audit[2154]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcf35cae0 a2=0 a3=7ffdcf35cacc items=0 ppid=2098 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.330000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:47:52.331000 audit[2153]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2153 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.331000 audit[2153]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeec98c420 a2=0 a3=7ffeec98c40c items=0 ppid=2098 pid=2153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.331000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:47:52.350116 env[1206]: time="2025-05-15T10:47:52.350074410Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-ztl7b,Uid:e23bb82c-8557-4fce-89ae-2ab55cfd9499,Namespace:tigera-operator,Attempt:0,}" May 15 10:47:52.370781 env[1206]: time="2025-05-15T10:47:52.370682477Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:47:52.370781 env[1206]: time="2025-05-15T10:47:52.370753642Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:47:52.370781 env[1206]: time="2025-05-15T10:47:52.370766404Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:47:52.370979 env[1206]: time="2025-05-15T10:47:52.370895262Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/54b7f5ee71dd712e87945fc5faaa9163c8b71666bb68dd1ac18faa1f566ab3c2 pid=2162 runtime=io.containerd.runc.v2 May 15 10:47:52.381893 systemd[1]: Started cri-containerd-54b7f5ee71dd712e87945fc5faaa9163c8b71666bb68dd1ac18faa1f566ab3c2.scope. May 15 10:47:52.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit: BPF prog-id=110 op=LOAD May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623766356565373164643731326538373934356663356661616139 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623766356565373164643731326538373934356663356661616139 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit: BPF prog-id=111 op=LOAD May 15 10:47:52.390000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001d7a20 items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623766356565373164643731326538373934356663356661616139 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit: BPF prog-id=112 op=LOAD May 15 10:47:52.390000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001d7a68 items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623766356565373164643731326538373934356663356661616139 May 15 10:47:52.390000 audit: BPF prog-id=112 op=UNLOAD May 15 10:47:52.390000 audit: BPF prog-id=111 op=UNLOAD May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:47:52.390000 audit: BPF prog-id=113 op=LOAD May 15 10:47:52.390000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001d7e78 items=0 ppid=2162 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.390000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534623766356565373164643731326538373934356663356661616139 May 15 10:47:52.412937 env[1206]: time="2025-05-15T10:47:52.412896649Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-ztl7b,Uid:e23bb82c-8557-4fce-89ae-2ab55cfd9499,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"54b7f5ee71dd712e87945fc5faaa9163c8b71666bb68dd1ac18faa1f566ab3c2\"" May 15 10:47:52.415010 env[1206]: time="2025-05-15T10:47:52.414980016Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:47:52.431000 audit[2194]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.431000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe076c4e40 a2=0 a3=7ffe076c4e2c items=0 ppid=2098 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.431000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:47:52.433000 audit[2196]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.433000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd2a2e8230 a2=0 a3=7ffd2a2e821c items=0 ppid=2098 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:47:52.437000 audit[2199]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.437000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe26bdd370 a2=0 a3=7ffe26bdd35c items=0 ppid=2098 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:47:52.437000 audit[2200]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.437000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc53d131f0 a2=0 a3=7ffc53d131dc items=0 ppid=2098 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:47:52.439000 audit[2202]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.439000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef0524020 a2=0 a3=7ffef052400c items=0 ppid=2098 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.439000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:47:52.440000 audit[2203]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2203 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.440000 audit[2203]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc896e9180 a2=0 a3=7ffc896e916c items=0 ppid=2098 pid=2203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.440000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:47:52.442000 audit[2205]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.442000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc81c89bd0 a2=0 a3=7ffc81c89bbc items=0 ppid=2098 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.442000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:47:52.445000 audit[2208]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.445000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff89cb3190 a2=0 a3=7fff89cb317c items=0 ppid=2098 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.445000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:47:52.446000 audit[2209]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.446000 audit[2209]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff326838c0 a2=0 a3=7fff326838ac items=0 ppid=2098 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.446000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:47:52.448000 audit[2211]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.448000 audit[2211]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3dce1d60 a2=0 a3=7ffe3dce1d4c items=0 ppid=2098 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.448000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:47:52.449000 audit[2212]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.449000 audit[2212]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd701a07f0 a2=0 a3=7ffd701a07dc items=0 ppid=2098 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.449000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:47:52.451000 audit[2214]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.451000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd6c2c58e0 a2=0 a3=7ffd6c2c58cc items=0 ppid=2098 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.451000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:47:52.454000 audit[2217]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2217 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.454000 audit[2217]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3a3ba8b0 a2=0 a3=7ffd3a3ba89c items=0 ppid=2098 pid=2217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.454000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:47:52.456000 audit[2220]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2220 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.456000 audit[2220]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd3c7d7190 a2=0 a3=7ffd3c7d717c items=0 ppid=2098 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.456000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:47:52.457000 audit[2221]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.457000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd85b8a450 a2=0 a3=7ffd85b8a43c items=0 ppid=2098 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.457000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:47:52.459000 audit[2223]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.459000 audit[2223]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffef0096c30 a2=0 a3=7ffef0096c1c items=0 ppid=2098 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.459000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:47:52.462000 audit[2226]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.462000 audit[2226]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca4aed570 a2=0 a3=7ffca4aed55c items=0 ppid=2098 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.462000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:47:52.463000 audit[2227]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.463000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1b4b5060 a2=0 a3=7ffe1b4b504c items=0 ppid=2098 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:47:52.465000 audit[2229]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:47:52.465000 audit[2229]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd313fe200 a2=0 a3=7ffd313fe1ec items=0 ppid=2098 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.465000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:47:52.484000 audit[2235]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:47:52.484000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc9ffcc980 a2=0 a3=7ffc9ffcc96c items=0 ppid=2098 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.484000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:47:52.493000 audit[2235]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:47:52.493000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc9ffcc980 a2=0 a3=7ffc9ffcc96c items=0 ppid=2098 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.493000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:47:52.494000 audit[2240]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.494000 audit[2240]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffdcc34dff0 a2=0 a3=7ffdcc34dfdc items=0 ppid=2098 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:47:52.496000 audit[2242]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.496000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffd05a677f0 a2=0 a3=7ffd05a677dc items=0 ppid=2098 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:47:52.499000 audit[2245]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.499000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffcb15b92c0 a2=0 a3=7ffcb15b92ac items=0 ppid=2098 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:47:52.500000 audit[2246]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.500000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5fbfb660 a2=0 a3=7fff5fbfb64c items=0 ppid=2098 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:47:52.502000 audit[2248]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.502000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcd85b7830 a2=0 a3=7ffcd85b781c items=0 ppid=2098 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:47:52.503000 audit[2249]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.503000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1ff46b80 a2=0 a3=7ffe1ff46b6c items=0 ppid=2098 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:47:52.505000 audit[2251]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.505000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcee38dd40 a2=0 a3=7ffcee38dd2c items=0 ppid=2098 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:47:52.508000 audit[2254]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.508000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7fffddb78520 a2=0 a3=7fffddb7850c items=0 ppid=2098 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:47:52.508000 audit[2255]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.508000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe327929a0 a2=0 a3=7ffe3279298c items=0 ppid=2098 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:47:52.510000 audit[2257]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.510000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd1cbd19d0 a2=0 a3=7ffd1cbd19bc items=0 ppid=2098 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:47:52.511000 audit[2258]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.511000 audit[2258]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe686e5180 a2=0 a3=7ffe686e516c items=0 ppid=2098 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.511000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:47:52.513000 audit[2260]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.513000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc547b2930 a2=0 a3=7ffc547b291c items=0 ppid=2098 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.513000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:47:52.516000 audit[2263]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.516000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffdb1685e0 a2=0 a3=7fffdb1685cc items=0 ppid=2098 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.516000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:47:52.519000 audit[2266]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.519000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff349e6ce0 a2=0 a3=7fff349e6ccc items=0 ppid=2098 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.519000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:47:52.520000 audit[2267]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.520000 audit[2267]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffbd456e30 a2=0 a3=7fffbd456e1c items=0 ppid=2098 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.520000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:47:52.521000 audit[2269]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.521000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffe5702ae70 a2=0 a3=7ffe5702ae5c items=0 ppid=2098 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:47:52.524000 audit[2272]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.524000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffd3d0625f0 a2=0 a3=7ffd3d0625dc items=0 ppid=2098 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:47:52.525000 audit[2273]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.525000 audit[2273]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6dde64f0 a2=0 a3=7fff6dde64dc items=0 ppid=2098 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:47:52.526000 audit[2275]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.526000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffd4dbff6f0 a2=0 a3=7ffd4dbff6dc items=0 ppid=2098 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.526000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:47:52.527000 audit[2276]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.527000 audit[2276]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde9c91940 a2=0 a3=7ffde9c9192c items=0 ppid=2098 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:47:52.529000 audit[2278]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.529000 audit[2278]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc4761ef10 a2=0 a3=7ffc4761eefc items=0 ppid=2098 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.529000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:47:52.531000 audit[2281]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:47:52.531000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcd7d2ab70 a2=0 a3=7ffcd7d2ab5c items=0 ppid=2098 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.531000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:47:52.534000 audit[2283]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:47:52.534000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe4a0439c0 a2=0 a3=7ffe4a0439ac items=0 ppid=2098 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.534000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:47:52.534000 audit[2283]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2283 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:47:52.534000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe4a0439c0 a2=0 a3=7ffe4a0439ac items=0 ppid=2098 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:47:52.534000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:47:53.568245 env[1206]: time="2025-05-15T10:47:53.568165322Z" level=error msg="PullImage \"quay.io/tigera/operator:v1.36.7\" failed" error="failed to pull and unpack image \"quay.io/tigera/operator:v1.36.7\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn01.quay.io/quayio-production-s3/sha256/e9/e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20250515%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250515T104753Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=f40d24f691f2af5c97b7ae63b785fbd275431cb32794ec4f89dddfae499742c3®ion=us-east-1&namespace=tigera&repo_name=operator&akamai_signature=exp=1747306973~hmac=b7eed4fb4a601982d2bff799fd9a50197b734aaddba7a190811f0c57b3bdf822\": dial tcp: lookup cdn01.quay.io: no such host" May 15 10:47:53.568616 kubelet[1952]: E0515 10:47:53.568452 1952 log.go:32] "PullImage from image service failed" err="rpc error: code = Unknown desc = failed to pull and unpack image \"quay.io/tigera/operator:v1.36.7\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn01.quay.io/quayio-production-s3/sha256/e9/e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20250515%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250515T104753Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=f40d24f691f2af5c97b7ae63b785fbd275431cb32794ec4f89dddfae499742c3®ion=us-east-1&namespace=tigera&repo_name=operator&akamai_signature=exp=1747306973~hmac=b7eed4fb4a601982d2bff799fd9a50197b734aaddba7a190811f0c57b3bdf822\": dial tcp: lookup cdn01.quay.io: no such host" image="quay.io/tigera/operator:v1.36.7" May 15 10:47:53.568616 kubelet[1952]: E0515 10:47:53.568521 1952 kuberuntime_image.go:55] "Failed to pull image" err="failed to pull and unpack image \"quay.io/tigera/operator:v1.36.7\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn01.quay.io/quayio-production-s3/sha256/e9/e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20250515%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250515T104753Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=f40d24f691f2af5c97b7ae63b785fbd275431cb32794ec4f89dddfae499742c3®ion=us-east-1&namespace=tigera&repo_name=operator&akamai_signature=exp=1747306973~hmac=b7eed4fb4a601982d2bff799fd9a50197b734aaddba7a190811f0c57b3bdf822\": dial tcp: lookup cdn01.quay.io: no such host" image="quay.io/tigera/operator:v1.36.7" May 15 10:47:53.568873 kubelet[1952]: E0515 10:47:53.568676 1952 kuberuntime_manager.go:1272] "Unhandled Error" err="container &Container{Name:tigera-operator,Image:quay.io/tigera/operator:v1.36.7,Command:[operator],Args:[],WorkingDir:,Ports:[]ContainerPort{},Env:[]EnvVar{EnvVar{Name:WATCH_NAMESPACE,Value:,ValueFrom:nil,},EnvVar{Name:POD_NAME,Value:,ValueFrom:&EnvVarSource{FieldRef:&ObjectFieldSelector{APIVersion:v1,FieldPath:metadata.name,},ResourceFieldRef:nil,ConfigMapKeyRef:nil,SecretKeyRef:nil,},},EnvVar{Name:OPERATOR_NAME,Value:tigera-operator,ValueFrom:nil,},EnvVar{Name:TIGERA_OPERATOR_INIT_IMAGE_VERSION,Value:v1.36.7,ValueFrom:nil,},},Resources:ResourceRequirements{Limits:ResourceList{},Requests:ResourceList{},Claims:[]ResourceClaim{},},VolumeMounts:[]VolumeMount{VolumeMount{Name:var-lib-calico,ReadOnly:true,MountPath:/var/lib/calico,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},VolumeMount{Name:kube-api-access-9kcb6,ReadOnly:true,MountPath:/var/run/secrets/kubernetes.io/serviceaccount,SubPath:,MountPropagation:nil,SubPathExpr:,RecursiveReadOnly:nil,},},LivenessProbe:nil,ReadinessProbe:nil,Lifecycle:nil,TerminationMessagePath:/dev/termination-log,ImagePullPolicy:IfNotPresent,SecurityContext:nil,Stdin:false,StdinOnce:false,TTY:false,EnvFrom:[]EnvFromSource{EnvFromSource{Prefix:,ConfigMapRef:&ConfigMapEnvSource{LocalObjectReference:LocalObjectReference{Name:kubernetes-services-endpoint,},Optional:*true,},SecretRef:nil,},},TerminationMessagePolicy:File,VolumeDevices:[]VolumeDevice{},StartupProbe:nil,ResizePolicy:[]ContainerResizePolicy{},RestartPolicy:nil,} start failed in pod tigera-operator-6f6897fdc5-ztl7b_tigera-operator(e23bb82c-8557-4fce-89ae-2ab55cfd9499): ErrImagePull: failed to pull and unpack image \"quay.io/tigera/operator:v1.36.7\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \"https://cdn01.quay.io/quayio-production-s3/sha256/e9/e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20250515%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250515T104753Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=f40d24f691f2af5c97b7ae63b785fbd275431cb32794ec4f89dddfae499742c3®ion=us-east-1&namespace=tigera&repo_name=operator&akamai_signature=exp=1747306973~hmac=b7eed4fb4a601982d2bff799fd9a50197b734aaddba7a190811f0c57b3bdf822\": dial tcp: lookup cdn01.quay.io: no such host" logger="UnhandledError" May 15 10:47:53.569919 kubelet[1952]: E0515 10:47:53.569848 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with ErrImagePull: \"failed to pull and unpack image \\\"quay.io/tigera/operator:v1.36.7\\\": failed to copy: httpReadSeeker: failed open: failed to do request: Get \\\"https://cdn01.quay.io/quayio-production-s3/sha256/e9/e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIAI5LUAQGPZRPNKSJA%2F20250515%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20250515T104753Z&X-Amz-Expires=600&X-Amz-SignedHeaders=host&X-Amz-Signature=f40d24f691f2af5c97b7ae63b785fbd275431cb32794ec4f89dddfae499742c3®ion=us-east-1&namespace=tigera&repo_name=operator&akamai_signature=exp=1747306973~hmac=b7eed4fb4a601982d2bff799fd9a50197b734aaddba7a190811f0c57b3bdf822\\\": dial tcp: lookup cdn01.quay.io: no such host\"" pod="tigera-operator/tigera-operator-6f6897fdc5-ztl7b" podUID="e23bb82c-8557-4fce-89ae-2ab55cfd9499" May 15 10:47:54.320882 kubelet[1952]: E0515 10:47:54.320832 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with ImagePullBackOff: \"Back-off pulling image \\\"quay.io/tigera/operator:v1.36.7\\\"\"" pod="tigera-operator/tigera-operator-6f6897fdc5-ztl7b" podUID="e23bb82c-8557-4fce-89ae-2ab55cfd9499" May 15 10:47:59.100459 update_engine[1199]: I0515 10:47:59.100392 1199 update_attempter.cc:509] Updating boot flags... May 15 10:48:06.299085 env[1206]: time="2025-05-15T10:48:06.298899557Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:48:07.880809 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2212341749.mount: Deactivated successfully. May 15 10:48:09.316681 env[1206]: time="2025-05-15T10:48:09.316631488Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:09.318637 env[1206]: time="2025-05-15T10:48:09.318598243Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:09.320131 env[1206]: time="2025-05-15T10:48:09.320100906Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:09.321701 env[1206]: time="2025-05-15T10:48:09.321667895Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:09.322208 env[1206]: time="2025-05-15T10:48:09.322180872Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 10:48:09.324117 env[1206]: time="2025-05-15T10:48:09.324055470Z" level=info msg="CreateContainer within sandbox \"54b7f5ee71dd712e87945fc5faaa9163c8b71666bb68dd1ac18faa1f566ab3c2\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:48:09.336901 env[1206]: time="2025-05-15T10:48:09.336829290Z" level=info msg="CreateContainer within sandbox \"54b7f5ee71dd712e87945fc5faaa9163c8b71666bb68dd1ac18faa1f566ab3c2\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"2875da0ace6df5e562a2183fb96290746cdc85c29e536330a42fdd21b61845b0\"" May 15 10:48:09.337380 env[1206]: time="2025-05-15T10:48:09.337349733Z" level=info msg="StartContainer for \"2875da0ace6df5e562a2183fb96290746cdc85c29e536330a42fdd21b61845b0\"" May 15 10:48:09.353953 systemd[1]: run-containerd-runc-k8s.io-2875da0ace6df5e562a2183fb96290746cdc85c29e536330a42fdd21b61845b0-runc.QxWzmd.mount: Deactivated successfully. May 15 10:48:09.356571 systemd[1]: Started cri-containerd-2875da0ace6df5e562a2183fb96290746cdc85c29e536330a42fdd21b61845b0.scope. May 15 10:48:09.370466 kernel: kauditd_printk_skb: 243 callbacks suppressed May 15 10:48:09.370586 kernel: audit: type=1400 audit(1747306089.367:913): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375474 kernel: audit: type=1400 audit(1747306089.367:914): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375612 kernel: audit: type=1400 audit(1747306089.367:915): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380773 kernel: audit: type=1400 audit(1747306089.367:916): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380819 kernel: audit: type=1400 audit(1747306089.367:917): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.383921 kernel: audit: type=1400 audit(1747306089.367:918): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386868 kernel: audit: type=1400 audit(1747306089.367:919): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.389798 kernel: audit: type=1400 audit(1747306089.367:920): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.395618 kernel: audit: type=1400 audit(1747306089.367:921): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.395688 kernel: audit: type=1400 audit(1747306089.374:922): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.374000 audit: BPF prog-id=114 op=LOAD May 15 10:48:09.375000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2162 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:09.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373564613061636536646635653536326132313833666239363239 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2162 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:09.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373564613061636536646635653536326132313833666239363239 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.375000 audit: BPF prog-id=115 op=LOAD May 15 10:48:09.375000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000343d10 items=0 ppid=2162 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:09.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373564613061636536646635653536326132313833666239363239 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.380000 audit: BPF prog-id=116 op=LOAD May 15 10:48:09.380000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000343d58 items=0 ppid=2162 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:09.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373564613061636536646635653536326132313833666239363239 May 15 10:48:09.386000 audit: BPF prog-id=116 op=UNLOAD May 15 10:48:09.386000 audit: BPF prog-id=115 op=UNLOAD May 15 10:48:09.386000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { perfmon } for pid=2307 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit[2307]: AVC avc: denied { bpf } for pid=2307 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:09.386000 audit: BPF prog-id=117 op=LOAD May 15 10:48:09.386000 audit[2307]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000418168 items=0 ppid=2162 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:09.386000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238373564613061636536646635653536326132313833666239363239 May 15 10:48:09.732491 env[1206]: time="2025-05-15T10:48:09.732412412Z" level=info msg="StartContainer for \"2875da0ace6df5e562a2183fb96290746cdc85c29e536330a42fdd21b61845b0\" returns successfully" May 15 10:48:10.499715 systemd[1]: Started sshd@7-10.0.0.140:22-10.0.0.1:45448.service. May 15 10:48:10.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.140:22-10.0.0.1:45448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:10.529000 audit[2339]: USER_ACCT pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:10.530703 sshd[2339]: Accepted publickey for core from 10.0.0.1 port 45448 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:10.529000 audit[2339]: CRED_ACQ pid=2339 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:10.529000 audit[2339]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf818f800 a2=3 a3=0 items=0 ppid=1 pid=2339 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:10.529000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:10.531705 sshd[2339]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:10.535062 systemd-logind[1196]: New session 8 of user core. May 15 10:48:10.535827 systemd[1]: Started session-8.scope. May 15 10:48:10.544000 audit[2339]: USER_START pid=2339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:10.545000 audit[2341]: CRED_ACQ pid=2341 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:10.647575 sshd[2339]: pam_unix(sshd:session): session closed for user core May 15 10:48:10.647000 audit[2339]: USER_END pid=2339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:10.647000 audit[2339]: CRED_DISP pid=2339 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:10.650290 systemd[1]: sshd@7-10.0.0.140:22-10.0.0.1:45448.service: Deactivated successfully. May 15 10:48:10.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.140:22-10.0.0.1:45448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:10.650954 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:48:10.651716 systemd-logind[1196]: Session 8 logged out. Waiting for processes to exit. May 15 10:48:10.652484 systemd-logind[1196]: Removed session 8. May 15 10:48:12.078000 audit[2354]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:12.078000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffe498a8d0 a2=0 a3=7fffe498a8bc items=0 ppid=2098 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.078000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:12.085000 audit[2354]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2354 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:12.085000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffe498a8d0 a2=0 a3=0 items=0 ppid=2098 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:12.103000 audit[2356]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:12.103000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffceaca690 a2=0 a3=7fffceaca67c items=0 ppid=2098 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.103000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:12.107000 audit[2356]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2356 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:12.107000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffceaca690 a2=0 a3=0 items=0 ppid=2098 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:12.246825 kubelet[1952]: I0515 10:48:12.246736 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-ztl7b" podStartSLOduration=3.337896848 podStartE2EDuration="20.246714604s" podCreationTimestamp="2025-05-15 10:47:52 +0000 UTC" firstStartedPulling="2025-05-15 10:47:52.414200406 +0000 UTC m=+8.223835790" lastFinishedPulling="2025-05-15 10:48:09.323018162 +0000 UTC m=+25.132653546" observedRunningTime="2025-05-15 10:48:10.358981812 +0000 UTC m=+26.168617186" watchObservedRunningTime="2025-05-15 10:48:12.246714604 +0000 UTC m=+28.056349988" May 15 10:48:12.252685 systemd[1]: Created slice kubepods-besteffort-pod4c55f604_ad04_446b_847e_fe8d13a1675b.slice. May 15 10:48:12.404296 kubelet[1952]: E0515 10:48:12.404142 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:12.418475 kubelet[1952]: I0515 10:48:12.418416 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4c55f604-ad04-446b-847e-fe8d13a1675b-node-certs\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418475 kubelet[1952]: I0515 10:48:12.418469 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-flexvol-driver-host\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418475 kubelet[1952]: I0515 10:48:12.418486 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-cni-bin-dir\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418502 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-cni-net-dir\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418516 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-var-lib-calico\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418529 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-lib-modules\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418542 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-xtables-lock\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418557 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-policysync\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418568 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-cni-log-dir\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418580 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4c55f604-ad04-446b-847e-fe8d13a1675b-var-run-calico\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418594 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4c55f604-ad04-446b-847e-fe8d13a1675b-tigera-ca-bundle\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.418705 kubelet[1952]: I0515 10:48:12.418608 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k5v2q\" (UniqueName: \"kubernetes.io/projected/4c55f604-ad04-446b-847e-fe8d13a1675b-kube-api-access-k5v2q\") pod \"calico-node-47mn2\" (UID: \"4c55f604-ad04-446b-847e-fe8d13a1675b\") " pod="calico-system/calico-node-47mn2" May 15 10:48:12.519911 kubelet[1952]: I0515 10:48:12.519863 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/65316744-afb1-4edd-8d8b-470eb5f48b0e-socket-dir\") pod \"csi-node-driver-gv8kc\" (UID: \"65316744-afb1-4edd-8d8b-470eb5f48b0e\") " pod="calico-system/csi-node-driver-gv8kc" May 15 10:48:12.519911 kubelet[1952]: I0515 10:48:12.519906 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/65316744-afb1-4edd-8d8b-470eb5f48b0e-registration-dir\") pod \"csi-node-driver-gv8kc\" (UID: \"65316744-afb1-4edd-8d8b-470eb5f48b0e\") " pod="calico-system/csi-node-driver-gv8kc" May 15 10:48:12.520148 kubelet[1952]: I0515 10:48:12.519931 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/65316744-afb1-4edd-8d8b-470eb5f48b0e-kubelet-dir\") pod \"csi-node-driver-gv8kc\" (UID: \"65316744-afb1-4edd-8d8b-470eb5f48b0e\") " pod="calico-system/csi-node-driver-gv8kc" May 15 10:48:12.520342 kubelet[1952]: I0515 10:48:12.520304 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k29wq\" (UniqueName: \"kubernetes.io/projected/65316744-afb1-4edd-8d8b-470eb5f48b0e-kube-api-access-k29wq\") pod \"csi-node-driver-gv8kc\" (UID: \"65316744-afb1-4edd-8d8b-470eb5f48b0e\") " pod="calico-system/csi-node-driver-gv8kc" May 15 10:48:12.520683 kubelet[1952]: E0515 10:48:12.520656 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.520683 kubelet[1952]: W0515 10:48:12.520677 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.520792 kubelet[1952]: E0515 10:48:12.520710 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.521004 kubelet[1952]: E0515 10:48:12.520978 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.521004 kubelet[1952]: W0515 10:48:12.520997 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.521106 kubelet[1952]: E0515 10:48:12.521015 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.521294 kubelet[1952]: E0515 10:48:12.521242 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.521294 kubelet[1952]: W0515 10:48:12.521272 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.521294 kubelet[1952]: E0515 10:48:12.521289 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.521544 kubelet[1952]: E0515 10:48:12.521498 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.521544 kubelet[1952]: W0515 10:48:12.521514 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.521544 kubelet[1952]: E0515 10:48:12.521529 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.521666 kubelet[1952]: I0515 10:48:12.521558 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/65316744-afb1-4edd-8d8b-470eb5f48b0e-varrun\") pod \"csi-node-driver-gv8kc\" (UID: \"65316744-afb1-4edd-8d8b-470eb5f48b0e\") " pod="calico-system/csi-node-driver-gv8kc" May 15 10:48:12.521966 kubelet[1952]: E0515 10:48:12.521925 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.521966 kubelet[1952]: W0515 10:48:12.521946 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.522133 kubelet[1952]: E0515 10:48:12.521976 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.522248 kubelet[1952]: E0515 10:48:12.522223 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.522248 kubelet[1952]: W0515 10:48:12.522237 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.522454 kubelet[1952]: E0515 10:48:12.522418 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.522497 kubelet[1952]: W0515 10:48:12.522453 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.522585 kubelet[1952]: E0515 10:48:12.522555 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.522653 kubelet[1952]: E0515 10:48:12.522592 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.522705 kubelet[1952]: E0515 10:48:12.522686 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.522705 kubelet[1952]: W0515 10:48:12.522702 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.522796 kubelet[1952]: E0515 10:48:12.522737 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.522915 kubelet[1952]: E0515 10:48:12.522901 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.522971 kubelet[1952]: W0515 10:48:12.522914 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.523032 kubelet[1952]: E0515 10:48:12.523013 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.523125 kubelet[1952]: E0515 10:48:12.523101 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.523125 kubelet[1952]: W0515 10:48:12.523121 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.523230 kubelet[1952]: E0515 10:48:12.523178 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.523326 kubelet[1952]: E0515 10:48:12.523300 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.523326 kubelet[1952]: W0515 10:48:12.523316 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.523455 kubelet[1952]: E0515 10:48:12.523353 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.523582 kubelet[1952]: E0515 10:48:12.523561 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.523582 kubelet[1952]: W0515 10:48:12.523576 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.523669 kubelet[1952]: E0515 10:48:12.523610 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.523773 kubelet[1952]: E0515 10:48:12.523756 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.523773 kubelet[1952]: W0515 10:48:12.523770 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.523872 kubelet[1952]: E0515 10:48:12.523795 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.523958 kubelet[1952]: E0515 10:48:12.523942 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.523958 kubelet[1952]: W0515 10:48:12.523954 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.524033 kubelet[1952]: E0515 10:48:12.523978 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.524169 kubelet[1952]: E0515 10:48:12.524150 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.524169 kubelet[1952]: W0515 10:48:12.524166 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.524249 kubelet[1952]: E0515 10:48:12.524198 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.524376 kubelet[1952]: E0515 10:48:12.524359 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.524376 kubelet[1952]: W0515 10:48:12.524373 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.524460 kubelet[1952]: E0515 10:48:12.524400 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.524607 kubelet[1952]: E0515 10:48:12.524583 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.524607 kubelet[1952]: W0515 10:48:12.524598 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.524787 kubelet[1952]: E0515 10:48:12.524694 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.524829 kubelet[1952]: E0515 10:48:12.524791 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.524829 kubelet[1952]: W0515 10:48:12.524797 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.524829 kubelet[1952]: E0515 10:48:12.524816 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.525040 kubelet[1952]: E0515 10:48:12.525018 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.525040 kubelet[1952]: W0515 10:48:12.525032 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.525137 kubelet[1952]: E0515 10:48:12.525046 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.525330 kubelet[1952]: E0515 10:48:12.525307 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.525330 kubelet[1952]: W0515 10:48:12.525324 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.525420 kubelet[1952]: E0515 10:48:12.525343 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.525556 kubelet[1952]: E0515 10:48:12.525540 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.525556 kubelet[1952]: W0515 10:48:12.525552 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.525630 kubelet[1952]: E0515 10:48:12.525564 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.525770 kubelet[1952]: E0515 10:48:12.525754 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.525770 kubelet[1952]: W0515 10:48:12.525768 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.525860 kubelet[1952]: E0515 10:48:12.525784 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.526631 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.529485 kubelet[1952]: W0515 10:48:12.526642 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.526719 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.526851 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.529485 kubelet[1952]: W0515 10:48:12.526859 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.526928 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527014 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.529485 kubelet[1952]: W0515 10:48:12.527021 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527073 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527143 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.529485 kubelet[1952]: W0515 10:48:12.527149 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527197 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527321 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.529485 kubelet[1952]: W0515 10:48:12.527328 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527423 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527550 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.529485 kubelet[1952]: W0515 10:48:12.527557 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527566 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527673 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.529485 kubelet[1952]: W0515 10:48:12.527680 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527688 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527834 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.529485 kubelet[1952]: W0515 10:48:12.527840 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.529485 kubelet[1952]: E0515 10:48:12.527847 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.536165 kubelet[1952]: E0515 10:48:12.536146 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.536165 kubelet[1952]: W0515 10:48:12.536160 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.536266 kubelet[1952]: E0515 10:48:12.536176 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.536464 kubelet[1952]: E0515 10:48:12.536426 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.536464 kubelet[1952]: W0515 10:48:12.536448 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.536523 kubelet[1952]: E0515 10:48:12.536476 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.536615 kubelet[1952]: E0515 10:48:12.536596 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.536615 kubelet[1952]: W0515 10:48:12.536606 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.536665 kubelet[1952]: E0515 10:48:12.536628 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.536762 kubelet[1952]: E0515 10:48:12.536750 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.536786 kubelet[1952]: W0515 10:48:12.536761 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.536845 kubelet[1952]: E0515 10:48:12.536814 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.536907 kubelet[1952]: E0515 10:48:12.536896 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.536907 kubelet[1952]: W0515 10:48:12.536906 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.536955 kubelet[1952]: E0515 10:48:12.536929 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.537076 kubelet[1952]: E0515 10:48:12.537055 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.537076 kubelet[1952]: W0515 10:48:12.537069 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.537126 kubelet[1952]: E0515 10:48:12.537095 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.537268 kubelet[1952]: E0515 10:48:12.537251 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.537268 kubelet[1952]: W0515 10:48:12.537262 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.537450 kubelet[1952]: E0515 10:48:12.537291 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.537450 kubelet[1952]: E0515 10:48:12.537400 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.537450 kubelet[1952]: W0515 10:48:12.537406 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.537450 kubelet[1952]: E0515 10:48:12.537430 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.537598 kubelet[1952]: E0515 10:48:12.537585 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.537598 kubelet[1952]: W0515 10:48:12.537593 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.537649 kubelet[1952]: E0515 10:48:12.537607 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.537791 kubelet[1952]: E0515 10:48:12.537777 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.537791 kubelet[1952]: W0515 10:48:12.537786 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.537871 kubelet[1952]: E0515 10:48:12.537801 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.537999 kubelet[1952]: E0515 10:48:12.537987 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.537999 kubelet[1952]: W0515 10:48:12.537996 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.538047 kubelet[1952]: E0515 10:48:12.538007 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.538180 kubelet[1952]: E0515 10:48:12.538170 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.538180 kubelet[1952]: W0515 10:48:12.538179 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.538226 kubelet[1952]: E0515 10:48:12.538190 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.538344 kubelet[1952]: E0515 10:48:12.538328 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.538344 kubelet[1952]: W0515 10:48:12.538339 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.538415 kubelet[1952]: E0515 10:48:12.538353 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.538496 kubelet[1952]: E0515 10:48:12.538485 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.538496 kubelet[1952]: W0515 10:48:12.538494 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.538541 kubelet[1952]: E0515 10:48:12.538522 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.538637 kubelet[1952]: E0515 10:48:12.538626 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.538637 kubelet[1952]: W0515 10:48:12.538635 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.538683 kubelet[1952]: E0515 10:48:12.538658 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.538790 kubelet[1952]: E0515 10:48:12.538779 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.538790 kubelet[1952]: W0515 10:48:12.538788 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.538844 kubelet[1952]: E0515 10:48:12.538810 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.539025 kubelet[1952]: E0515 10:48:12.539012 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.539051 kubelet[1952]: W0515 10:48:12.539025 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.539051 kubelet[1952]: E0515 10:48:12.539041 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.539214 kubelet[1952]: E0515 10:48:12.539201 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.539238 kubelet[1952]: W0515 10:48:12.539214 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.539238 kubelet[1952]: E0515 10:48:12.539229 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.539399 kubelet[1952]: E0515 10:48:12.539387 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.539423 kubelet[1952]: W0515 10:48:12.539398 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.539423 kubelet[1952]: E0515 10:48:12.539408 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.539590 kubelet[1952]: E0515 10:48:12.539578 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.539616 kubelet[1952]: W0515 10:48:12.539589 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.539616 kubelet[1952]: E0515 10:48:12.539599 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.539752 kubelet[1952]: E0515 10:48:12.539741 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.539776 kubelet[1952]: W0515 10:48:12.539751 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.539776 kubelet[1952]: E0515 10:48:12.539760 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.539946 kubelet[1952]: E0515 10:48:12.539934 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.539971 kubelet[1952]: W0515 10:48:12.539946 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.539971 kubelet[1952]: E0515 10:48:12.539956 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.555072 kubelet[1952]: E0515 10:48:12.555037 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:12.555547 env[1206]: time="2025-05-15T10:48:12.555498317Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-47mn2,Uid:4c55f604-ad04-446b-847e-fe8d13a1675b,Namespace:calico-system,Attempt:0,}" May 15 10:48:12.639622 kubelet[1952]: E0515 10:48:12.639589 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.639622 kubelet[1952]: W0515 10:48:12.639612 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.639705 kubelet[1952]: E0515 10:48:12.639632 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.639883 kubelet[1952]: E0515 10:48:12.639861 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.639883 kubelet[1952]: W0515 10:48:12.639872 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.639883 kubelet[1952]: E0515 10:48:12.639884 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.640130 kubelet[1952]: E0515 10:48:12.640097 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.640130 kubelet[1952]: W0515 10:48:12.640121 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.640196 kubelet[1952]: E0515 10:48:12.640147 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.640386 kubelet[1952]: E0515 10:48:12.640353 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.640386 kubelet[1952]: W0515 10:48:12.640377 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.640590 kubelet[1952]: E0515 10:48:12.640410 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.640626 kubelet[1952]: E0515 10:48:12.640615 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.640626 kubelet[1952]: W0515 10:48:12.640622 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.640673 kubelet[1952]: E0515 10:48:12.640634 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.640871 kubelet[1952]: E0515 10:48:12.640847 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.640871 kubelet[1952]: W0515 10:48:12.640866 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.640942 kubelet[1952]: E0515 10:48:12.640880 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.641096 kubelet[1952]: E0515 10:48:12.641076 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.641096 kubelet[1952]: W0515 10:48:12.641087 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.641146 kubelet[1952]: E0515 10:48:12.641113 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.641283 kubelet[1952]: E0515 10:48:12.641258 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.641327 kubelet[1952]: W0515 10:48:12.641280 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.641327 kubelet[1952]: E0515 10:48:12.641316 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.641529 kubelet[1952]: E0515 10:48:12.641516 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.641529 kubelet[1952]: W0515 10:48:12.641527 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.641587 kubelet[1952]: E0515 10:48:12.641547 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.641717 kubelet[1952]: E0515 10:48:12.641705 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.641717 kubelet[1952]: W0515 10:48:12.641714 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.641762 kubelet[1952]: E0515 10:48:12.641726 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.641902 kubelet[1952]: E0515 10:48:12.641888 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.641902 kubelet[1952]: W0515 10:48:12.641900 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.641950 kubelet[1952]: E0515 10:48:12.641915 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.642071 kubelet[1952]: E0515 10:48:12.642058 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.642071 kubelet[1952]: W0515 10:48:12.642068 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.642117 kubelet[1952]: E0515 10:48:12.642080 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.642242 kubelet[1952]: E0515 10:48:12.642226 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.642242 kubelet[1952]: W0515 10:48:12.642237 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.642311 kubelet[1952]: E0515 10:48:12.642250 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.642399 kubelet[1952]: E0515 10:48:12.642386 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.642399 kubelet[1952]: W0515 10:48:12.642395 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.642457 kubelet[1952]: E0515 10:48:12.642407 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.642596 kubelet[1952]: E0515 10:48:12.642584 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.642596 kubelet[1952]: W0515 10:48:12.642592 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.642642 kubelet[1952]: E0515 10:48:12.642621 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.642760 kubelet[1952]: E0515 10:48:12.642731 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.642760 kubelet[1952]: W0515 10:48:12.642741 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.642849 kubelet[1952]: E0515 10:48:12.642764 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.643048 kubelet[1952]: E0515 10:48:12.643027 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.643048 kubelet[1952]: W0515 10:48:12.643040 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.643131 kubelet[1952]: E0515 10:48:12.643071 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.643230 kubelet[1952]: E0515 10:48:12.643215 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.643230 kubelet[1952]: W0515 10:48:12.643227 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.643303 kubelet[1952]: E0515 10:48:12.643263 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.643425 kubelet[1952]: E0515 10:48:12.643409 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.643425 kubelet[1952]: W0515 10:48:12.643421 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.643531 kubelet[1952]: E0515 10:48:12.643458 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.643689 kubelet[1952]: E0515 10:48:12.643674 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.643734 kubelet[1952]: W0515 10:48:12.643698 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.643734 kubelet[1952]: E0515 10:48:12.643716 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.643917 kubelet[1952]: E0515 10:48:12.643900 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.643917 kubelet[1952]: W0515 10:48:12.643913 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.644014 kubelet[1952]: E0515 10:48:12.643928 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.644135 kubelet[1952]: E0515 10:48:12.644117 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.644135 kubelet[1952]: W0515 10:48:12.644131 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.644208 kubelet[1952]: E0515 10:48:12.644146 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.644398 kubelet[1952]: E0515 10:48:12.644379 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.644398 kubelet[1952]: W0515 10:48:12.644394 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.644490 kubelet[1952]: E0515 10:48:12.644404 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.644589 kubelet[1952]: E0515 10:48:12.644576 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.644589 kubelet[1952]: W0515 10:48:12.644586 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.644635 kubelet[1952]: E0515 10:48:12.644593 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.644804 kubelet[1952]: E0515 10:48:12.644786 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.644804 kubelet[1952]: W0515 10:48:12.644800 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.644878 kubelet[1952]: E0515 10:48:12.644810 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.742933 kubelet[1952]: E0515 10:48:12.742904 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.742933 kubelet[1952]: W0515 10:48:12.742921 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.743028 kubelet[1952]: E0515 10:48:12.742937 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.753208 kubelet[1952]: E0515 10:48:12.752867 1952 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:48:12.753208 kubelet[1952]: W0515 10:48:12.752884 1952 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:48:12.753208 kubelet[1952]: E0515 10:48:12.752903 1952 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:48:12.755356 env[1206]: time="2025-05-15T10:48:12.755309002Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:48:12.755481 env[1206]: time="2025-05-15T10:48:12.755449057Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:48:12.755591 env[1206]: time="2025-05-15T10:48:12.755567536Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:48:12.755993 env[1206]: time="2025-05-15T10:48:12.755970526Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a pid=2445 runtime=io.containerd.runc.v2 May 15 10:48:12.768111 systemd[1]: Started cri-containerd-398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a.scope. May 15 10:48:12.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit: BPF prog-id=118 op=LOAD May 15 10:48:12.780000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2445 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386665653334663637303562653133383433643836393235323762 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2445 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386665653334663637303562653133383433643836393235323762 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.780000 audit: BPF prog-id=119 op=LOAD May 15 10:48:12.780000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00015dfc0 items=0 ppid=2445 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386665653334663637303562653133383433643836393235323762 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit: BPF prog-id=120 op=LOAD May 15 10:48:12.781000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000394008 items=0 ppid=2445 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386665653334663637303562653133383433643836393235323762 May 15 10:48:12.781000 audit: BPF prog-id=120 op=UNLOAD May 15 10:48:12.781000 audit: BPF prog-id=119 op=UNLOAD May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:12.781000 audit: BPF prog-id=121 op=LOAD May 15 10:48:12.781000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000394418 items=0 ppid=2445 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:12.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386665653334663637303562653133383433643836393235323762 May 15 10:48:12.792982 env[1206]: time="2025-05-15T10:48:12.792939916Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-47mn2,Uid:4c55f604-ad04-446b-847e-fe8d13a1675b,Namespace:calico-system,Attempt:0,} returns sandbox id \"398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a\"" May 15 10:48:12.793730 kubelet[1952]: E0515 10:48:12.793704 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:12.795234 env[1206]: time="2025-05-15T10:48:12.795201905Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:48:13.117000 audit[2480]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:13.117000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc84776e70 a2=0 a3=7ffc84776e5c items=0 ppid=2098 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:13.117000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:13.122000 audit[2480]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2480 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:13.122000 audit[2480]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc84776e70 a2=0 a3=0 items=0 ppid=2098 pid=2480 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:13.122000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:14.297406 kubelet[1952]: E0515 10:48:14.297350 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:14.464458 env[1206]: time="2025-05-15T10:48:14.464381640Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:14.466141 env[1206]: time="2025-05-15T10:48:14.466103290Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:14.467518 env[1206]: time="2025-05-15T10:48:14.467496504Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:14.469550 env[1206]: time="2025-05-15T10:48:14.469518553Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:14.469979 env[1206]: time="2025-05-15T10:48:14.469951449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 10:48:14.471806 env[1206]: time="2025-05-15T10:48:14.471772126Z" level=info msg="CreateContainer within sandbox \"398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:48:14.485714 env[1206]: time="2025-05-15T10:48:14.485668498Z" level=info msg="CreateContainer within sandbox \"398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"5d60bd34c2bacb1f04d9442f7198cca7fe38b95f1e95269445e77f8373c44db9\"" May 15 10:48:14.486110 env[1206]: time="2025-05-15T10:48:14.486062763Z" level=info msg="StartContainer for \"5d60bd34c2bacb1f04d9442f7198cca7fe38b95f1e95269445e77f8373c44db9\"" May 15 10:48:14.503778 systemd[1]: Started cri-containerd-5d60bd34c2bacb1f04d9442f7198cca7fe38b95f1e95269445e77f8373c44db9.scope. May 15 10:48:14.513000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.515748 kernel: kauditd_printk_skb: 133 callbacks suppressed May 15 10:48:14.515807 kernel: audit: type=1400 audit(1747306094.513:964): avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9334727b18 items=0 ppid=2445 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:14.523186 kernel: audit: type=1300 audit(1747306094.513:964): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f9334727b18 items=0 ppid=2445 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:14.523229 kernel: audit: type=1327 audit(1747306094.513:964): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363062643334633262616362316630346439343432663731393863 May 15 10:48:14.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363062643334633262616362316630346439343432663731393863 May 15 10:48:14.527133 kernel: audit: type=1400 audit(1747306094.513:965): avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.533565 kernel: audit: type=1400 audit(1747306094.513:965): avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.533611 kernel: audit: type=1400 audit(1747306094.513:965): avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.539511 kernel: audit: type=1400 audit(1747306094.513:965): avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.539559 kernel: audit: type=1400 audit(1747306094.513:965): avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.545468 kernel: audit: type=1400 audit(1747306094.513:965): avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.545529 kernel: audit: type=1400 audit(1747306094.513:965): avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.546242 env[1206]: time="2025-05-15T10:48:14.546184670Z" level=info msg="StartContainer for \"5d60bd34c2bacb1f04d9442f7198cca7fe38b95f1e95269445e77f8373c44db9\" returns successfully" May 15 10:48:14.513000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.513000 audit: BPF prog-id=122 op=LOAD May 15 10:48:14.513000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000293008 items=0 ppid=2445 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:14.513000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363062643334633262616362316630346439343432663731393863 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.518000 audit: BPF prog-id=123 op=LOAD May 15 10:48:14.518000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000293058 items=0 ppid=2445 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:14.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363062643334633262616362316630346439343432663731393863 May 15 10:48:14.522000 audit: BPF prog-id=123 op=UNLOAD May 15 10:48:14.522000 audit: BPF prog-id=122 op=UNLOAD May 15 10:48:14.522000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { perfmon } for pid=2488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit[2488]: AVC avc: denied { bpf } for pid=2488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:14.522000 audit: BPF prog-id=124 op=LOAD May 15 10:48:14.522000 audit[2488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002930e8 items=0 ppid=2445 pid=2488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:14.522000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564363062643334633262616362316630346439343432663731393863 May 15 10:48:14.554820 systemd[1]: cri-containerd-5d60bd34c2bacb1f04d9442f7198cca7fe38b95f1e95269445e77f8373c44db9.scope: Deactivated successfully. May 15 10:48:14.559000 audit: BPF prog-id=124 op=UNLOAD May 15 10:48:14.574051 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5d60bd34c2bacb1f04d9442f7198cca7fe38b95f1e95269445e77f8373c44db9-rootfs.mount: Deactivated successfully. May 15 10:48:14.642949 env[1206]: time="2025-05-15T10:48:14.642899465Z" level=info msg="shim disconnected" id=5d60bd34c2bacb1f04d9442f7198cca7fe38b95f1e95269445e77f8373c44db9 May 15 10:48:14.642949 env[1206]: time="2025-05-15T10:48:14.642944609Z" level=warning msg="cleaning up after shim disconnected" id=5d60bd34c2bacb1f04d9442f7198cca7fe38b95f1e95269445e77f8373c44db9 namespace=k8s.io May 15 10:48:14.642949 env[1206]: time="2025-05-15T10:48:14.642953246Z" level=info msg="cleaning up dead shim" May 15 10:48:14.649062 env[1206]: time="2025-05-15T10:48:14.649041279Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:48:14Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2526 runtime=io.containerd.runc.v2\n" May 15 10:48:15.360292 kubelet[1952]: E0515 10:48:15.360259 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:15.360886 env[1206]: time="2025-05-15T10:48:15.360845813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:48:15.652866 systemd[1]: Started sshd@8-10.0.0.140:22-10.0.0.1:45464.service. May 15 10:48:15.651000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.140:22-10.0.0.1:45464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:15.682000 audit[2544]: USER_ACCT pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:15.684290 sshd[2544]: Accepted publickey for core from 10.0.0.1 port 45464 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:15.683000 audit[2544]: CRED_ACQ pid=2544 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:15.683000 audit[2544]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb535c1e0 a2=3 a3=0 items=0 ppid=1 pid=2544 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:15.683000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:15.685346 sshd[2544]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:15.688468 systemd-logind[1196]: New session 9 of user core. May 15 10:48:15.689180 systemd[1]: Started session-9.scope. May 15 10:48:15.691000 audit[2544]: USER_START pid=2544 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:15.692000 audit[2546]: CRED_ACQ pid=2546 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:15.786226 sshd[2544]: pam_unix(sshd:session): session closed for user core May 15 10:48:15.785000 audit[2544]: USER_END pid=2544 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:15.785000 audit[2544]: CRED_DISP pid=2544 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:15.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.140:22-10.0.0.1:45464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:15.788865 systemd[1]: sshd@8-10.0.0.140:22-10.0.0.1:45464.service: Deactivated successfully. May 15 10:48:15.789621 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:48:15.790498 systemd-logind[1196]: Session 9 logged out. Waiting for processes to exit. May 15 10:48:15.791143 systemd-logind[1196]: Removed session 9. May 15 10:48:16.297804 kubelet[1952]: E0515 10:48:16.297756 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:18.298590 kubelet[1952]: E0515 10:48:18.298550 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:20.429922 kubelet[1952]: E0515 10:48:20.429845 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:20.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.140:22-10.0.0.1:51526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:20.791111 systemd[1]: Started sshd@9-10.0.0.140:22-10.0.0.1:51526.service. May 15 10:48:20.792687 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 10:48:20.792744 kernel: audit: type=1130 audit(1747306100.789:980): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.140:22-10.0.0.1:51526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:20.826000 audit[2558]: USER_ACCT pid=2558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.832082 sshd[2558]: Accepted publickey for core from 10.0.0.1 port 51526 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:20.830000 audit[2558]: CRED_ACQ pid=2558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.832373 sshd[2558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:20.836045 kernel: audit: type=1101 audit(1747306100.826:981): pid=2558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.836098 kernel: audit: type=1103 audit(1747306100.830:982): pid=2558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.838386 kernel: audit: type=1006 audit(1747306100.830:983): pid=2558 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 10:48:20.842450 kernel: audit: type=1300 audit(1747306100.830:983): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd5d42e50 a2=3 a3=0 items=0 ppid=1 pid=2558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:20.830000 audit[2558]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd5d42e50 a2=3 a3=0 items=0 ppid=1 pid=2558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:20.841205 systemd[1]: Started session-10.scope. May 15 10:48:20.841602 systemd-logind[1196]: New session 10 of user core. May 15 10:48:20.844203 kernel: audit: type=1327 audit(1747306100.830:983): proctitle=737368643A20636F7265205B707269765D May 15 10:48:20.830000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:20.844000 audit[2558]: USER_START pid=2558 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.845000 audit[2560]: CRED_ACQ pid=2560 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.853699 kernel: audit: type=1105 audit(1747306100.844:984): pid=2558 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.853744 kernel: audit: type=1103 audit(1747306100.845:985): pid=2560 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.944932 sshd[2558]: pam_unix(sshd:session): session closed for user core May 15 10:48:20.944000 audit[2558]: USER_END pid=2558 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.947190 systemd[1]: sshd@9-10.0.0.140:22-10.0.0.1:51526.service: Deactivated successfully. May 15 10:48:20.947818 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:48:20.948766 systemd-logind[1196]: Session 10 logged out. Waiting for processes to exit. May 15 10:48:20.949354 systemd-logind[1196]: Removed session 10. May 15 10:48:20.944000 audit[2558]: CRED_DISP pid=2558 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.953492 kernel: audit: type=1106 audit(1747306100.944:986): pid=2558 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.953556 kernel: audit: type=1104 audit(1747306100.944:987): pid=2558 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:20.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.140:22-10.0.0.1:51526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:22.297039 kubelet[1952]: E0515 10:48:22.296991 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:23.350083 env[1206]: time="2025-05-15T10:48:23.350020963Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:23.353252 env[1206]: time="2025-05-15T10:48:23.353199018Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:23.355223 env[1206]: time="2025-05-15T10:48:23.355193111Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:23.356614 env[1206]: time="2025-05-15T10:48:23.356552180Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:23.356933 env[1206]: time="2025-05-15T10:48:23.356904427Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 10:48:23.361684 env[1206]: time="2025-05-15T10:48:23.361652090Z" level=info msg="CreateContainer within sandbox \"398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:48:23.380047 env[1206]: time="2025-05-15T10:48:23.379985654Z" level=info msg="CreateContainer within sandbox \"398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"226ae303a6517bf9f8c1bba8737ddb5987c45008b63130f6fbb6e1d94cbe112c\"" May 15 10:48:23.380321 env[1206]: time="2025-05-15T10:48:23.380286848Z" level=info msg="StartContainer for \"226ae303a6517bf9f8c1bba8737ddb5987c45008b63130f6fbb6e1d94cbe112c\"" May 15 10:48:23.396935 systemd[1]: Started cri-containerd-226ae303a6517bf9f8c1bba8737ddb5987c45008b63130f6fbb6e1d94cbe112c.scope. May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=7fc549bcde38 items=0 ppid=2445 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:23.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232366165333033613635313762663966386331626261383733376464 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit: BPF prog-id=125 op=LOAD May 15 10:48:23.409000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00035b088 items=0 ppid=2445 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:23.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232366165333033613635313762663966386331626261383733376464 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit: BPF prog-id=126 op=LOAD May 15 10:48:23.409000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00035b0d8 items=0 ppid=2445 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:23.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232366165333033613635313762663966386331626261383733376464 May 15 10:48:23.409000 audit: BPF prog-id=126 op=UNLOAD May 15 10:48:23.409000 audit: BPF prog-id=125 op=UNLOAD May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:23.409000 audit: BPF prog-id=127 op=LOAD May 15 10:48:23.409000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c00035b168 items=0 ppid=2445 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:23.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232366165333033613635313762663966386331626261383733376464 May 15 10:48:23.423747 env[1206]: time="2025-05-15T10:48:23.423690850Z" level=info msg="StartContainer for \"226ae303a6517bf9f8c1bba8737ddb5987c45008b63130f6fbb6e1d94cbe112c\" returns successfully" May 15 10:48:24.300643 kubelet[1952]: E0515 10:48:24.300591 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:24.375508 kubelet[1952]: E0515 10:48:24.375477 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:24.549563 systemd[1]: cri-containerd-226ae303a6517bf9f8c1bba8737ddb5987c45008b63130f6fbb6e1d94cbe112c.scope: Deactivated successfully. May 15 10:48:24.554000 audit: BPF prog-id=127 op=UNLOAD May 15 10:48:24.564567 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-226ae303a6517bf9f8c1bba8737ddb5987c45008b63130f6fbb6e1d94cbe112c-rootfs.mount: Deactivated successfully. May 15 10:48:24.618577 kubelet[1952]: I0515 10:48:24.618543 1952 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 15 10:48:24.897239 env[1206]: time="2025-05-15T10:48:24.896838271Z" level=info msg="shim disconnected" id=226ae303a6517bf9f8c1bba8737ddb5987c45008b63130f6fbb6e1d94cbe112c May 15 10:48:24.897239 env[1206]: time="2025-05-15T10:48:24.896878292Z" level=warning msg="cleaning up after shim disconnected" id=226ae303a6517bf9f8c1bba8737ddb5987c45008b63130f6fbb6e1d94cbe112c namespace=k8s.io May 15 10:48:24.897239 env[1206]: time="2025-05-15T10:48:24.896890497Z" level=info msg="cleaning up dead shim" May 15 10:48:24.904661 systemd[1]: Created slice kubepods-burstable-podf3f5f565_e792_43e5_bf72_d062e6fd07b7.slice. May 15 10:48:24.909665 env[1206]: time="2025-05-15T10:48:24.909594326Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:48:24Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2625 runtime=io.containerd.runc.v2\n" May 15 10:48:24.922636 systemd[1]: Created slice kubepods-burstable-pode401b110_ba0e_4108_a723_ee9c1b540a00.slice. May 15 10:48:24.927562 systemd[1]: Created slice kubepods-besteffort-podc3a870f1_7b6e_437a_99e2_7212954e3584.slice. May 15 10:48:24.929205 kubelet[1952]: I0515 10:48:24.928402 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f3f5f565-e792-43e5-bf72-d062e6fd07b7-config-volume\") pod \"coredns-6f6b679f8f-82p6n\" (UID: \"f3f5f565-e792-43e5-bf72-d062e6fd07b7\") " pod="kube-system/coredns-6f6b679f8f-82p6n" May 15 10:48:24.929292 kubelet[1952]: I0515 10:48:24.929222 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h42cx\" (UniqueName: \"kubernetes.io/projected/f3f5f565-e792-43e5-bf72-d062e6fd07b7-kube-api-access-h42cx\") pod \"coredns-6f6b679f8f-82p6n\" (UID: \"f3f5f565-e792-43e5-bf72-d062e6fd07b7\") " pod="kube-system/coredns-6f6b679f8f-82p6n" May 15 10:48:24.932340 systemd[1]: Created slice kubepods-besteffort-podfe2f25b9_87c8_4042_8686_41ddfa8c069c.slice. May 15 10:48:24.936724 systemd[1]: Created slice kubepods-besteffort-podfd98c940_6651_401b_85a6_d522ed01b648.slice. May 15 10:48:25.030204 kubelet[1952]: I0515 10:48:25.030150 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rf2cn\" (UniqueName: \"kubernetes.io/projected/e401b110-ba0e-4108-a723-ee9c1b540a00-kube-api-access-rf2cn\") pod \"coredns-6f6b679f8f-xwdzt\" (UID: \"e401b110-ba0e-4108-a723-ee9c1b540a00\") " pod="kube-system/coredns-6f6b679f8f-xwdzt" May 15 10:48:25.030204 kubelet[1952]: I0515 10:48:25.030190 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c3a870f1-7b6e-437a-99e2-7212954e3584-tigera-ca-bundle\") pod \"calico-kube-controllers-6cdd7cd95d-nhh2l\" (UID: \"c3a870f1-7b6e-437a-99e2-7212954e3584\") " pod="calico-system/calico-kube-controllers-6cdd7cd95d-nhh2l" May 15 10:48:25.030204 kubelet[1952]: I0515 10:48:25.030206 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fd98c940-6651-401b-85a6-d522ed01b648-calico-apiserver-certs\") pod \"calico-apiserver-54db556d75-hzxpv\" (UID: \"fd98c940-6651-401b-85a6-d522ed01b648\") " pod="calico-apiserver/calico-apiserver-54db556d75-hzxpv" May 15 10:48:25.030427 kubelet[1952]: I0515 10:48:25.030224 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e401b110-ba0e-4108-a723-ee9c1b540a00-config-volume\") pod \"coredns-6f6b679f8f-xwdzt\" (UID: \"e401b110-ba0e-4108-a723-ee9c1b540a00\") " pod="kube-system/coredns-6f6b679f8f-xwdzt" May 15 10:48:25.030427 kubelet[1952]: I0515 10:48:25.030250 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-79njd\" (UniqueName: \"kubernetes.io/projected/c3a870f1-7b6e-437a-99e2-7212954e3584-kube-api-access-79njd\") pod \"calico-kube-controllers-6cdd7cd95d-nhh2l\" (UID: \"c3a870f1-7b6e-437a-99e2-7212954e3584\") " pod="calico-system/calico-kube-controllers-6cdd7cd95d-nhh2l" May 15 10:48:25.030427 kubelet[1952]: I0515 10:48:25.030266 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-frqpt\" (UniqueName: \"kubernetes.io/projected/fe2f25b9-87c8-4042-8686-41ddfa8c069c-kube-api-access-frqpt\") pod \"calico-apiserver-54db556d75-r6c6b\" (UID: \"fe2f25b9-87c8-4042-8686-41ddfa8c069c\") " pod="calico-apiserver/calico-apiserver-54db556d75-r6c6b" May 15 10:48:25.030427 kubelet[1952]: I0515 10:48:25.030283 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6l2ph\" (UniqueName: \"kubernetes.io/projected/fd98c940-6651-401b-85a6-d522ed01b648-kube-api-access-6l2ph\") pod \"calico-apiserver-54db556d75-hzxpv\" (UID: \"fd98c940-6651-401b-85a6-d522ed01b648\") " pod="calico-apiserver/calico-apiserver-54db556d75-hzxpv" May 15 10:48:25.030427 kubelet[1952]: I0515 10:48:25.030296 1952 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fe2f25b9-87c8-4042-8686-41ddfa8c069c-calico-apiserver-certs\") pod \"calico-apiserver-54db556d75-r6c6b\" (UID: \"fe2f25b9-87c8-4042-8686-41ddfa8c069c\") " pod="calico-apiserver/calico-apiserver-54db556d75-r6c6b" May 15 10:48:25.214783 kubelet[1952]: E0515 10:48:25.214741 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:25.215455 env[1206]: time="2025-05-15T10:48:25.215404383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-82p6n,Uid:f3f5f565-e792-43e5-bf72-d062e6fd07b7,Namespace:kube-system,Attempt:0,}" May 15 10:48:25.225284 kubelet[1952]: E0515 10:48:25.225256 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:25.225769 env[1206]: time="2025-05-15T10:48:25.225726769Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xwdzt,Uid:e401b110-ba0e-4108-a723-ee9c1b540a00,Namespace:kube-system,Attempt:0,}" May 15 10:48:25.230296 env[1206]: time="2025-05-15T10:48:25.230258383Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdd7cd95d-nhh2l,Uid:c3a870f1-7b6e-437a-99e2-7212954e3584,Namespace:calico-system,Attempt:0,}" May 15 10:48:25.235152 env[1206]: time="2025-05-15T10:48:25.235115740Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54db556d75-r6c6b,Uid:fe2f25b9-87c8-4042-8686-41ddfa8c069c,Namespace:calico-apiserver,Attempt:0,}" May 15 10:48:25.238474 env[1206]: time="2025-05-15T10:48:25.238430205Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54db556d75-hzxpv,Uid:fd98c940-6651-401b-85a6-d522ed01b648,Namespace:calico-apiserver,Attempt:0,}" May 15 10:48:25.384355 kubelet[1952]: E0515 10:48:25.383542 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:25.385935 env[1206]: time="2025-05-15T10:48:25.384235785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:48:25.401972 env[1206]: time="2025-05-15T10:48:25.401888585Z" level=error msg="Failed to destroy network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.402289 env[1206]: time="2025-05-15T10:48:25.402251862Z" level=error msg="encountered an error cleaning up failed sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.402346 env[1206]: time="2025-05-15T10:48:25.402308618Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54db556d75-r6c6b,Uid:fe2f25b9-87c8-4042-8686-41ddfa8c069c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.402563 kubelet[1952]: E0515 10:48:25.402522 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.402627 kubelet[1952]: E0515 10:48:25.402585 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54db556d75-r6c6b" May 15 10:48:25.402627 kubelet[1952]: E0515 10:48:25.402603 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54db556d75-r6c6b" May 15 10:48:25.402683 kubelet[1952]: E0515 10:48:25.402634 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-54db556d75-r6c6b_calico-apiserver(fe2f25b9-87c8-4042-8686-41ddfa8c069c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-54db556d75-r6c6b_calico-apiserver(fe2f25b9-87c8-4042-8686-41ddfa8c069c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54db556d75-r6c6b" podUID="fe2f25b9-87c8-4042-8686-41ddfa8c069c" May 15 10:48:25.411967 env[1206]: time="2025-05-15T10:48:25.411880640Z" level=error msg="Failed to destroy network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.412218 env[1206]: time="2025-05-15T10:48:25.412189106Z" level=error msg="encountered an error cleaning up failed sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.412265 env[1206]: time="2025-05-15T10:48:25.412231062Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xwdzt,Uid:e401b110-ba0e-4108-a723-ee9c1b540a00,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.412474 kubelet[1952]: E0515 10:48:25.412420 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.412542 kubelet[1952]: E0515 10:48:25.412497 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-xwdzt" May 15 10:48:25.412542 kubelet[1952]: E0515 10:48:25.412519 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-xwdzt" May 15 10:48:25.412595 kubelet[1952]: E0515 10:48:25.412565 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-xwdzt_kube-system(e401b110-ba0e-4108-a723-ee9c1b540a00)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-xwdzt_kube-system(e401b110-ba0e-4108-a723-ee9c1b540a00)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xwdzt" podUID="e401b110-ba0e-4108-a723-ee9c1b540a00" May 15 10:48:25.415330 env[1206]: time="2025-05-15T10:48:25.415275199Z" level=error msg="Failed to destroy network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.415621 env[1206]: time="2025-05-15T10:48:25.415598073Z" level=error msg="encountered an error cleaning up failed sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.415690 env[1206]: time="2025-05-15T10:48:25.415643866Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdd7cd95d-nhh2l,Uid:c3a870f1-7b6e-437a-99e2-7212954e3584,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.415807 kubelet[1952]: E0515 10:48:25.415782 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.415807 kubelet[1952]: E0515 10:48:25.415814 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cdd7cd95d-nhh2l" May 15 10:48:25.415924 kubelet[1952]: E0515 10:48:25.415830 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6cdd7cd95d-nhh2l" May 15 10:48:25.415924 kubelet[1952]: E0515 10:48:25.415852 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6cdd7cd95d-nhh2l_calico-system(c3a870f1-7b6e-437a-99e2-7212954e3584)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6cdd7cd95d-nhh2l_calico-system(c3a870f1-7b6e-437a-99e2-7212954e3584)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cdd7cd95d-nhh2l" podUID="c3a870f1-7b6e-437a-99e2-7212954e3584" May 15 10:48:25.427508 env[1206]: time="2025-05-15T10:48:25.427425503Z" level=error msg="Failed to destroy network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.427799 env[1206]: time="2025-05-15T10:48:25.427759822Z" level=error msg="encountered an error cleaning up failed sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.427962 env[1206]: time="2025-05-15T10:48:25.427810063Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-82p6n,Uid:f3f5f565-e792-43e5-bf72-d062e6fd07b7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.428040 kubelet[1952]: E0515 10:48:25.428005 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.428119 kubelet[1952]: E0515 10:48:25.428058 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-82p6n" May 15 10:48:25.428119 kubelet[1952]: E0515 10:48:25.428078 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-82p6n" May 15 10:48:25.428173 kubelet[1952]: E0515 10:48:25.428117 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-82p6n_kube-system(f3f5f565-e792-43e5-bf72-d062e6fd07b7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-82p6n_kube-system(f3f5f565-e792-43e5-bf72-d062e6fd07b7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-82p6n" podUID="f3f5f565-e792-43e5-bf72-d062e6fd07b7" May 15 10:48:25.433408 env[1206]: time="2025-05-15T10:48:25.433352830Z" level=error msg="Failed to destroy network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.433700 env[1206]: time="2025-05-15T10:48:25.433664723Z" level=error msg="encountered an error cleaning up failed sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.433736 env[1206]: time="2025-05-15T10:48:25.433712260Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54db556d75-hzxpv,Uid:fd98c940-6651-401b-85a6-d522ed01b648,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.433987 kubelet[1952]: E0515 10:48:25.433946 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:25.434033 kubelet[1952]: E0515 10:48:25.434007 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54db556d75-hzxpv" May 15 10:48:25.434061 kubelet[1952]: E0515 10:48:25.434035 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-54db556d75-hzxpv" May 15 10:48:25.434106 kubelet[1952]: E0515 10:48:25.434079 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-54db556d75-hzxpv_calico-apiserver(fd98c940-6651-401b-85a6-d522ed01b648)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-54db556d75-hzxpv_calico-apiserver(fd98c940-6651-401b-85a6-d522ed01b648)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54db556d75-hzxpv" podUID="fd98c940-6651-401b-85a6-d522ed01b648" May 15 10:48:25.950289 systemd[1]: Started sshd@10-10.0.0.140:22-10.0.0.1:51534.service. May 15 10:48:25.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.140:22-10.0.0.1:51534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:25.951368 kernel: kauditd_printk_skb: 45 callbacks suppressed May 15 10:48:25.951454 kernel: audit: type=1130 audit(1747306105.948:996): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.140:22-10.0.0.1:51534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:25.980000 audit[2841]: USER_ACCT pid=2841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:25.982461 sshd[2841]: Accepted publickey for core from 10.0.0.1 port 51534 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:25.983914 sshd[2841]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:25.982000 audit[2841]: CRED_ACQ pid=2841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:25.987282 systemd-logind[1196]: New session 11 of user core. May 15 10:48:25.988042 systemd[1]: Started session-11.scope. May 15 10:48:25.990103 kernel: audit: type=1101 audit(1747306105.980:997): pid=2841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:25.990153 kernel: audit: type=1103 audit(1747306105.982:998): pid=2841 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:25.990178 kernel: audit: type=1006 audit(1747306105.982:999): pid=2841 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 10:48:25.982000 audit[2841]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf5601a70 a2=3 a3=0 items=0 ppid=1 pid=2841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:25.996255 kernel: audit: type=1300 audit(1747306105.982:999): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf5601a70 a2=3 a3=0 items=0 ppid=1 pid=2841 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:25.996294 kernel: audit: type=1327 audit(1747306105.982:999): proctitle=737368643A20636F7265205B707269765D May 15 10:48:25.982000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:25.989000 audit[2841]: USER_START pid=2841 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.001708 kernel: audit: type=1105 audit(1747306105.989:1000): pid=2841 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.001735 kernel: audit: type=1103 audit(1747306105.990:1001): pid=2843 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:25.990000 audit[2843]: CRED_ACQ pid=2843 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.091044 sshd[2841]: pam_unix(sshd:session): session closed for user core May 15 10:48:26.090000 audit[2841]: USER_END pid=2841 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.093937 systemd[1]: sshd@10-10.0.0.140:22-10.0.0.1:51534.service: Deactivated successfully. May 15 10:48:26.094444 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:48:26.099485 systemd-logind[1196]: Session 11 logged out. Waiting for processes to exit. May 15 10:48:26.090000 audit[2841]: CRED_DISP pid=2841 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.113659 systemd[1]: Started sshd@11-10.0.0.140:22-10.0.0.1:51542.service. May 15 10:48:26.114570 systemd-logind[1196]: Removed session 11. May 15 10:48:26.116693 kernel: audit: type=1106 audit(1747306106.090:1002): pid=2841 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.116737 kernel: audit: type=1104 audit(1747306106.090:1003): pid=2841 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.092000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.140:22-10.0.0.1:51534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:26.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.140:22-10.0.0.1:51542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:26.141000 audit[2856]: USER_ACCT pid=2856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.143541 sshd[2856]: Accepted publickey for core from 10.0.0.1 port 51542 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:26.142000 audit[2856]: CRED_ACQ pid=2856 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.142000 audit[2856]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcc3f96ce0 a2=3 a3=0 items=0 ppid=1 pid=2856 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:26.142000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:26.144568 sshd[2856]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:26.147662 systemd-logind[1196]: New session 12 of user core. May 15 10:48:26.148363 systemd[1]: Started session-12.scope. May 15 10:48:26.149000 audit[2856]: USER_START pid=2856 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.150000 audit[2858]: CRED_ACQ pid=2858 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.278399 sshd[2856]: pam_unix(sshd:session): session closed for user core May 15 10:48:26.281344 systemd[1]: Started sshd@12-10.0.0.140:22-10.0.0.1:51554.service. May 15 10:48:26.281784 systemd[1]: sshd@11-10.0.0.140:22-10.0.0.1:51542.service: Deactivated successfully. May 15 10:48:26.278000 audit[2856]: USER_END pid=2856 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.278000 audit[2856]: CRED_DISP pid=2856 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.140:22-10.0.0.1:51554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:26.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.140:22-10.0.0.1:51542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:26.283389 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:48:26.284127 systemd-logind[1196]: Session 12 logged out. Waiting for processes to exit. May 15 10:48:26.285123 systemd-logind[1196]: Removed session 12. May 15 10:48:26.304837 systemd[1]: Created slice kubepods-besteffort-pod65316744_afb1_4edd_8d8b_470eb5f48b0e.slice. May 15 10:48:26.306863 env[1206]: time="2025-05-15T10:48:26.306821852Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gv8kc,Uid:65316744-afb1-4edd-8d8b-470eb5f48b0e,Namespace:calico-system,Attempt:0,}" May 15 10:48:26.325000 audit[2866]: USER_ACCT pid=2866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.326742 sshd[2866]: Accepted publickey for core from 10.0.0.1 port 51554 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:26.326000 audit[2866]: CRED_ACQ pid=2866 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.326000 audit[2866]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe4192fa50 a2=3 a3=0 items=0 ppid=1 pid=2866 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:26.326000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:26.327841 sshd[2866]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:26.331246 systemd-logind[1196]: New session 13 of user core. May 15 10:48:26.332219 systemd[1]: Started session-13.scope. May 15 10:48:26.335000 audit[2866]: USER_START pid=2866 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.336000 audit[2880]: CRED_ACQ pid=2880 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.366522 env[1206]: time="2025-05-15T10:48:26.366465243Z" level=error msg="Failed to destroy network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.366787 env[1206]: time="2025-05-15T10:48:26.366752154Z" level=error msg="encountered an error cleaning up failed sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.366820 env[1206]: time="2025-05-15T10:48:26.366796112Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gv8kc,Uid:65316744-afb1-4edd-8d8b-470eb5f48b0e,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.367029 kubelet[1952]: E0515 10:48:26.366987 1952 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.367103 kubelet[1952]: E0515 10:48:26.367056 1952 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gv8kc" May 15 10:48:26.367103 kubelet[1952]: E0515 10:48:26.367075 1952 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-gv8kc" May 15 10:48:26.367153 kubelet[1952]: E0515 10:48:26.367116 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-gv8kc_calico-system(65316744-afb1-4edd-8d8b-470eb5f48b0e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-gv8kc_calico-system(65316744-afb1-4edd-8d8b-470eb5f48b0e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:26.368182 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99-shm.mount: Deactivated successfully. May 15 10:48:26.385840 kubelet[1952]: I0515 10:48:26.385815 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:26.386852 env[1206]: time="2025-05-15T10:48:26.386821361Z" level=info msg="StopPodSandbox for \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\"" May 15 10:48:26.388515 kubelet[1952]: I0515 10:48:26.388153 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:26.390065 env[1206]: time="2025-05-15T10:48:26.390017043Z" level=info msg="StopPodSandbox for \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\"" May 15 10:48:26.391279 kubelet[1952]: I0515 10:48:26.390833 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:26.393903 env[1206]: time="2025-05-15T10:48:26.393880669Z" level=info msg="StopPodSandbox for \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\"" May 15 10:48:26.395198 kubelet[1952]: I0515 10:48:26.395168 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:26.397311 env[1206]: time="2025-05-15T10:48:26.397288932Z" level=info msg="StopPodSandbox for \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\"" May 15 10:48:26.399276 kubelet[1952]: I0515 10:48:26.399251 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:26.400133 env[1206]: time="2025-05-15T10:48:26.400053972Z" level=info msg="StopPodSandbox for \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\"" May 15 10:48:26.400992 kubelet[1952]: I0515 10:48:26.400790 1952 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:26.402224 env[1206]: time="2025-05-15T10:48:26.401827965Z" level=info msg="StopPodSandbox for \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\"" May 15 10:48:26.436421 env[1206]: time="2025-05-15T10:48:26.436353502Z" level=error msg="StopPodSandbox for \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\" failed" error="failed to destroy network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.436666 kubelet[1952]: E0515 10:48:26.436624 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:26.436748 kubelet[1952]: E0515 10:48:26.436688 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3"} May 15 10:48:26.436794 kubelet[1952]: E0515 10:48:26.436751 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f3f5f565-e792-43e5-bf72-d062e6fd07b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:48:26.436794 kubelet[1952]: E0515 10:48:26.436775 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f3f5f565-e792-43e5-bf72-d062e6fd07b7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-82p6n" podUID="f3f5f565-e792-43e5-bf72-d062e6fd07b7" May 15 10:48:26.453079 sshd[2866]: pam_unix(sshd:session): session closed for user core May 15 10:48:26.454389 env[1206]: time="2025-05-15T10:48:26.454334020Z" level=error msg="StopPodSandbox for \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\" failed" error="failed to destroy network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.452000 audit[2866]: USER_END pid=2866 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.452000 audit[2866]: CRED_DISP pid=2866 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:26.455007 kubelet[1952]: E0515 10:48:26.454737 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:26.455007 kubelet[1952]: E0515 10:48:26.454778 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99"} May 15 10:48:26.455007 kubelet[1952]: E0515 10:48:26.454806 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"65316744-afb1-4edd-8d8b-470eb5f48b0e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:48:26.455007 kubelet[1952]: E0515 10:48:26.454828 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"65316744-afb1-4edd-8d8b-470eb5f48b0e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-gv8kc" podUID="65316744-afb1-4edd-8d8b-470eb5f48b0e" May 15 10:48:26.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.140:22-10.0.0.1:51554 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:26.454981 systemd[1]: sshd@12-10.0.0.140:22-10.0.0.1:51554.service: Deactivated successfully. May 15 10:48:26.455633 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:48:26.456274 systemd-logind[1196]: Session 13 logged out. Waiting for processes to exit. May 15 10:48:26.457106 systemd-logind[1196]: Removed session 13. May 15 10:48:26.462581 env[1206]: time="2025-05-15T10:48:26.462522945Z" level=error msg="StopPodSandbox for \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\" failed" error="failed to destroy network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.462792 kubelet[1952]: E0515 10:48:26.462745 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:26.462851 kubelet[1952]: E0515 10:48:26.462806 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48"} May 15 10:48:26.462851 kubelet[1952]: E0515 10:48:26.462841 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c3a870f1-7b6e-437a-99e2-7212954e3584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:48:26.462931 kubelet[1952]: E0515 10:48:26.462868 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c3a870f1-7b6e-437a-99e2-7212954e3584\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6cdd7cd95d-nhh2l" podUID="c3a870f1-7b6e-437a-99e2-7212954e3584" May 15 10:48:26.463659 env[1206]: time="2025-05-15T10:48:26.463630168Z" level=error msg="StopPodSandbox for \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\" failed" error="failed to destroy network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.463934 kubelet[1952]: E0515 10:48:26.463856 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:26.463934 kubelet[1952]: E0515 10:48:26.463876 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc"} May 15 10:48:26.463934 kubelet[1952]: E0515 10:48:26.463895 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fe2f25b9-87c8-4042-8686-41ddfa8c069c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:48:26.463934 kubelet[1952]: E0515 10:48:26.463911 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fe2f25b9-87c8-4042-8686-41ddfa8c069c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54db556d75-r6c6b" podUID="fe2f25b9-87c8-4042-8686-41ddfa8c069c" May 15 10:48:26.475456 env[1206]: time="2025-05-15T10:48:26.475394355Z" level=error msg="StopPodSandbox for \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\" failed" error="failed to destroy network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.475700 kubelet[1952]: E0515 10:48:26.475670 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:26.475700 kubelet[1952]: E0515 10:48:26.475695 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0"} May 15 10:48:26.475782 kubelet[1952]: E0515 10:48:26.475715 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e401b110-ba0e-4108-a723-ee9c1b540a00\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:48:26.475782 kubelet[1952]: E0515 10:48:26.475734 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e401b110-ba0e-4108-a723-ee9c1b540a00\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-xwdzt" podUID="e401b110-ba0e-4108-a723-ee9c1b540a00" May 15 10:48:26.477220 env[1206]: time="2025-05-15T10:48:26.477180022Z" level=error msg="StopPodSandbox for \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\" failed" error="failed to destroy network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:48:26.477324 kubelet[1952]: E0515 10:48:26.477295 1952 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:26.477324 kubelet[1952]: E0515 10:48:26.477318 1952 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7"} May 15 10:48:26.477524 kubelet[1952]: E0515 10:48:26.477339 1952 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd98c940-6651-401b-85a6-d522ed01b648\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:48:26.477524 kubelet[1952]: E0515 10:48:26.477355 1952 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd98c940-6651-401b-85a6-d522ed01b648\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-54db556d75-hzxpv" podUID="fd98c940-6651-401b-85a6-d522ed01b648" May 15 10:48:31.457488 systemd[1]: Started sshd@13-10.0.0.140:22-10.0.0.1:55952.service. May 15 10:48:31.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.140:22-10.0.0.1:55952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:31.458547 kernel: kauditd_printk_skb: 23 callbacks suppressed May 15 10:48:31.458633 kernel: audit: type=1130 audit(1747306111.457:1023): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.140:22-10.0.0.1:55952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:31.488000 audit[3054]: USER_ACCT pid=3054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.492000 audit[3054]: CRED_ACQ pid=3054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.492826 sshd[3054]: Accepted publickey for core from 10.0.0.1 port 55952 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:31.492961 sshd[3054]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:31.493610 kernel: audit: type=1101 audit(1747306111.488:1024): pid=3054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.493664 kernel: audit: type=1103 audit(1747306111.492:1025): pid=3054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.497056 systemd-logind[1196]: New session 14 of user core. May 15 10:48:31.497524 systemd[1]: Started session-14.scope. May 15 10:48:31.498707 kernel: audit: type=1006 audit(1747306111.492:1026): pid=3054 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 May 15 10:48:31.498788 kernel: audit: type=1300 audit(1747306111.492:1026): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd70630fb0 a2=3 a3=0 items=0 ppid=1 pid=3054 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:31.492000 audit[3054]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd70630fb0 a2=3 a3=0 items=0 ppid=1 pid=3054 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:31.492000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:31.504073 kernel: audit: type=1327 audit(1747306111.492:1026): proctitle=737368643A20636F7265205B707269765D May 15 10:48:31.502000 audit[3054]: USER_START pid=3054 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.508505 kernel: audit: type=1105 audit(1747306111.502:1027): pid=3054 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.508644 kernel: audit: type=1103 audit(1747306111.503:1028): pid=3056 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.503000 audit[3056]: CRED_ACQ pid=3056 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.609184 sshd[3054]: pam_unix(sshd:session): session closed for user core May 15 10:48:31.617634 kernel: audit: type=1106 audit(1747306111.609:1029): pid=3054 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.617690 kernel: audit: type=1104 audit(1747306111.609:1030): pid=3054 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.609000 audit[3054]: USER_END pid=3054 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.609000 audit[3054]: CRED_DISP pid=3054 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:31.611321 systemd[1]: sshd@13-10.0.0.140:22-10.0.0.1:55952.service: Deactivated successfully. May 15 10:48:31.611954 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:48:31.612607 systemd-logind[1196]: Session 14 logged out. Waiting for processes to exit. May 15 10:48:31.613270 systemd-logind[1196]: Removed session 14. May 15 10:48:31.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.140:22-10.0.0.1:55952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:33.618565 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3400340900.mount: Deactivated successfully. May 15 10:48:35.242028 env[1206]: time="2025-05-15T10:48:35.241891556Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:35.260636 env[1206]: time="2025-05-15T10:48:35.260578610Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:35.274920 env[1206]: time="2025-05-15T10:48:35.274863357Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:35.293651 env[1206]: time="2025-05-15T10:48:35.293597906Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:35.294249 env[1206]: time="2025-05-15T10:48:35.294224930Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 10:48:35.300860 env[1206]: time="2025-05-15T10:48:35.300828421Z" level=info msg="CreateContainer within sandbox \"398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:48:35.401187 env[1206]: time="2025-05-15T10:48:35.401124626Z" level=info msg="CreateContainer within sandbox \"398fee34f6705be13843d8692527b60de491c5241ae302a2ccd31e902466338a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"d14954bb5759325522c709673bcc4920067492e98e0644c646778c3f9893c8d0\"" May 15 10:48:35.401693 env[1206]: time="2025-05-15T10:48:35.401666330Z" level=info msg="StartContainer for \"d14954bb5759325522c709673bcc4920067492e98e0644c646778c3f9893c8d0\"" May 15 10:48:35.419119 systemd[1]: Started cri-containerd-d14954bb5759325522c709673bcc4920067492e98e0644c646778c3f9893c8d0.scope. May 15 10:48:35.433000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.433000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f8c69be81d8 items=0 ppid=2445 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:35.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343935346262353735393332353532326337303936373362636334 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit: BPF prog-id=128 op=LOAD May 15 10:48:35.434000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003bc218 items=0 ppid=2445 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:35.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343935346262353735393332353532326337303936373362636334 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.434000 audit: BPF prog-id=129 op=LOAD May 15 10:48:35.434000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003bc268 items=0 ppid=2445 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:35.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343935346262353735393332353532326337303936373362636334 May 15 10:48:35.434000 audit: BPF prog-id=129 op=UNLOAD May 15 10:48:35.435000 audit: BPF prog-id=128 op=UNLOAD May 15 10:48:35.435000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { perfmon } for pid=3077 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit[3077]: AVC avc: denied { bpf } for pid=3077 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:35.435000 audit: BPF prog-id=130 op=LOAD May 15 10:48:35.435000 audit[3077]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003bc2f8 items=0 ppid=2445 pid=3077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:35.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431343935346262353735393332353532326337303936373362636334 May 15 10:48:35.465698 env[1206]: time="2025-05-15T10:48:35.465625421Z" level=info msg="StartContainer for \"d14954bb5759325522c709673bcc4920067492e98e0644c646778c3f9893c8d0\" returns successfully" May 15 10:48:35.520729 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:48:35.520840 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:48:36.421102 kubelet[1952]: E0515 10:48:36.421070 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:36.494838 kubelet[1952]: I0515 10:48:36.494766 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-47mn2" podStartSLOduration=1.99436711 podStartE2EDuration="24.494747534s" podCreationTimestamp="2025-05-15 10:48:12 +0000 UTC" firstStartedPulling="2025-05-15 10:48:12.794807132 +0000 UTC m=+28.604442517" lastFinishedPulling="2025-05-15 10:48:35.295187557 +0000 UTC m=+51.104822941" observedRunningTime="2025-05-15 10:48:36.494477775 +0000 UTC m=+52.304113149" watchObservedRunningTime="2025-05-15 10:48:36.494747534 +0000 UTC m=+52.304382918" May 15 10:48:36.614069 systemd[1]: Started sshd@14-10.0.0.140:22-10.0.0.1:55968.service. May 15 10:48:36.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.140:22-10.0.0.1:55968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:36.615124 kernel: kauditd_printk_skb: 44 callbacks suppressed May 15 10:48:36.615199 kernel: audit: type=1130 audit(1747306116.613:1038): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.140:22-10.0.0.1:55968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:36.647000 audit[3135]: USER_ACCT pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.648724 sshd[3135]: Accepted publickey for core from 10.0.0.1 port 55968 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:36.658101 kernel: audit: type=1101 audit(1747306116.647:1039): pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.658246 kernel: audit: type=1103 audit(1747306116.651:1040): pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.658268 kernel: audit: type=1006 audit(1747306116.651:1041): pid=3135 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 10:48:36.651000 audit[3135]: CRED_ACQ pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.656944 systemd[1]: Started session-15.scope. May 15 10:48:36.652210 sshd[3135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:36.657938 systemd-logind[1196]: New session 15 of user core. May 15 10:48:36.651000 audit[3135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12b5aed0 a2=3 a3=0 items=0 ppid=1 pid=3135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.651000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:36.664631 kernel: audit: type=1300 audit(1747306116.651:1041): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd12b5aed0 a2=3 a3=0 items=0 ppid=1 pid=3135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.664700 kernel: audit: type=1327 audit(1747306116.651:1041): proctitle=737368643A20636F7265205B707269765D May 15 10:48:36.664721 kernel: audit: type=1105 audit(1747306116.661:1042): pid=3135 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.661000 audit[3135]: USER_START pid=3135 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.672706 kernel: audit: type=1103 audit(1747306116.662:1043): pid=3160 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.662000 audit[3160]: CRED_ACQ pid=3160 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.771977 sshd[3135]: pam_unix(sshd:session): session closed for user core May 15 10:48:36.772000 audit[3135]: USER_END pid=3135 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.774460 systemd[1]: sshd@14-10.0.0.140:22-10.0.0.1:55968.service: Deactivated successfully. May 15 10:48:36.775097 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:48:36.775594 systemd-logind[1196]: Session 15 logged out. Waiting for processes to exit. May 15 10:48:36.776217 systemd-logind[1196]: Removed session 15. May 15 10:48:36.772000 audit[3135]: CRED_DISP pid=3135 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.780946 kernel: audit: type=1106 audit(1747306116.772:1044): pid=3135 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.780993 kernel: audit: type=1104 audit(1747306116.772:1045): pid=3135 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:36.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.140:22-10.0.0.1:55968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:36.829000 audit[3228]: AVC avc: denied { write } for pid=3228 comm="tee" name="fd" dev="proc" ino=25259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:48:36.829000 audit[3228]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc9ef31a23 a2=241 a3=1b6 items=1 ppid=3209 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.829000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:48:36.829000 audit: PATH item=0 name="/dev/fd/63" inode=25254 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:48:36.829000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:48:36.833000 audit[3230]: AVC avc: denied { write } for pid=3230 comm="tee" name="fd" dev="proc" ino=26111 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:48:36.833000 audit[3230]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd4855da32 a2=241 a3=1b6 items=1 ppid=3202 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.833000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:48:36.833000 audit: PATH item=0 name="/dev/fd/63" inode=26106 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:48:36.833000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:48:36.840000 audit[3261]: AVC avc: denied { write } for pid=3261 comm="tee" name="fd" dev="proc" ino=26117 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:48:36.840000 audit[3261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc019d0a34 a2=241 a3=1b6 items=1 ppid=3203 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.840000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:48:36.840000 audit: PATH item=0 name="/dev/fd/63" inode=24129 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:48:36.840000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:48:36.846000 audit[3266]: AVC avc: denied { write } for pid=3266 comm="tee" name="fd" dev="proc" ino=26123 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:48:36.846000 audit[3266]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffc287ca32 a2=241 a3=1b6 items=1 ppid=3210 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.846000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:48:36.846000 audit: PATH item=0 name="/dev/fd/63" inode=23283 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:48:36.846000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:48:36.851000 audit[3270]: AVC avc: denied { write } for pid=3270 comm="tee" name="fd" dev="proc" ino=26131 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:48:36.851000 audit[3270]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffee3503a22 a2=241 a3=1b6 items=1 ppid=3214 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.851000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:48:36.851000 audit: PATH item=0 name="/dev/fd/63" inode=24131 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:48:36.851000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:48:36.853000 audit[3259]: AVC avc: denied { write } for pid=3259 comm="tee" name="fd" dev="proc" ino=24134 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:48:36.853000 audit[3259]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffda53aaa32 a2=241 a3=1b6 items=1 ppid=3204 pid=3259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.853000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:48:36.853000 audit: PATH item=0 name="/dev/fd/63" inode=24128 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:48:36.853000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:48:36.855000 audit[3277]: AVC avc: denied { write } for pid=3277 comm="tee" name="fd" dev="proc" ino=23286 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:48:36.855000 audit[3277]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe8531ca33 a2=241 a3=1b6 items=1 ppid=3201 pid=3277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:36.855000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:48:36.855000 audit: PATH item=0 name="/dev/fd/63" inode=24138 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:48:36.855000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:48:37.297802 env[1206]: time="2025-05-15T10:48:37.297762083Z" level=info msg="StopPodSandbox for \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\"" May 15 10:48:37.298138 env[1206]: time="2025-05-15T10:48:37.297881793Z" level=info msg="StopPodSandbox for \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\"" May 15 10:48:37.423453 kubelet[1952]: E0515 10:48:37.423405 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.373 [INFO][3327] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.373 [INFO][3327] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" iface="eth0" netns="/var/run/netns/cni-1226f34d-4302-6f4d-5e2d-078a921b663e" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.373 [INFO][3327] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" iface="eth0" netns="/var/run/netns/cni-1226f34d-4302-6f4d-5e2d-078a921b663e" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.374 [INFO][3327] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" iface="eth0" netns="/var/run/netns/cni-1226f34d-4302-6f4d-5e2d-078a921b663e" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.374 [INFO][3327] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.374 [INFO][3327] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.418 [INFO][3343] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.419 [INFO][3343] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.419 [INFO][3343] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.455 [WARNING][3343] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.455 [INFO][3343] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.460 [INFO][3343] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:37.465482 env[1206]: 2025-05-15 10:48:37.464 [INFO][3327] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:37.467411 systemd[1]: run-netns-cni\x2d1226f34d\x2d4302\x2d6f4d\x2d5e2d\x2d078a921b663e.mount: Deactivated successfully. May 15 10:48:37.468100 env[1206]: time="2025-05-15T10:48:37.468048735Z" level=info msg="TearDown network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\" successfully" May 15 10:48:37.468281 env[1206]: time="2025-05-15T10:48:37.468261259Z" level=info msg="StopPodSandbox for \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\" returns successfully" May 15 10:48:37.469290 env[1206]: time="2025-05-15T10:48:37.469236617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gv8kc,Uid:65316744-afb1-4edd-8d8b-470eb5f48b0e,Namespace:calico-system,Attempt:1,}" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.400 [INFO][3326] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.400 [INFO][3326] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" iface="eth0" netns="/var/run/netns/cni-bb21a999-554d-bb82-5d6f-41c10fc022be" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.401 [INFO][3326] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" iface="eth0" netns="/var/run/netns/cni-bb21a999-554d-bb82-5d6f-41c10fc022be" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.401 [INFO][3326] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" iface="eth0" netns="/var/run/netns/cni-bb21a999-554d-bb82-5d6f-41c10fc022be" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.401 [INFO][3326] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.401 [INFO][3326] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.419 [INFO][3350] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.420 [INFO][3350] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.460 [INFO][3350] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.468 [WARNING][3350] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.468 [INFO][3350] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.469 [INFO][3350] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:37.472705 env[1206]: 2025-05-15 10:48:37.471 [INFO][3326] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:37.474253 systemd[1]: run-netns-cni\x2dbb21a999\x2d554d\x2dbb82\x2d5d6f\x2d41c10fc022be.mount: Deactivated successfully. May 15 10:48:37.475136 env[1206]: time="2025-05-15T10:48:37.475100115Z" level=info msg="TearDown network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\" successfully" May 15 10:48:37.475136 env[1206]: time="2025-05-15T10:48:37.475133912Z" level=info msg="StopPodSandbox for \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\" returns successfully" May 15 10:48:37.475846 env[1206]: time="2025-05-15T10:48:37.475822246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdd7cd95d-nhh2l,Uid:c3a870f1-7b6e-437a-99e2-7212954e3584,Namespace:calico-system,Attempt:1,}" May 15 10:48:37.953239 systemd-networkd[1037]: cali5c536501178: Link UP May 15 10:48:37.954939 systemd-networkd[1037]: cali5c536501178: Gained carrier May 15 10:48:37.955461 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5c536501178: link becomes ready May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.831 [INFO][3388] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.842 [INFO][3388] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0 calico-kube-controllers-6cdd7cd95d- calico-system c3a870f1-7b6e-437a-99e2-7212954e3584 896 0 2025-05-15 10:48:12 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6cdd7cd95d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-6cdd7cd95d-nhh2l eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5c536501178 [] []}} ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Namespace="calico-system" Pod="calico-kube-controllers-6cdd7cd95d-nhh2l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.842 [INFO][3388] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Namespace="calico-system" Pod="calico-kube-controllers-6cdd7cd95d-nhh2l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.865 [INFO][3414] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" HandleID="k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.874 [INFO][3414] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" HandleID="k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308a30), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-6cdd7cd95d-nhh2l", "timestamp":"2025-05-15 10:48:37.865574203 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.875 [INFO][3414] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.875 [INFO][3414] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.875 [INFO][3414] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.877 [INFO][3414] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.880 [INFO][3414] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.883 [INFO][3414] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.884 [INFO][3414] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.886 [INFO][3414] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.886 [INFO][3414] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.887 [INFO][3414] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045 May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.929 [INFO][3414] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.938 [INFO][3414] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.938 [INFO][3414] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" host="localhost" May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.938 [INFO][3414] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:37.995121 env[1206]: 2025-05-15 10:48:37.938 [INFO][3414] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" HandleID="k8s-pod-network.74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.995857 env[1206]: 2025-05-15 10:48:37.944 [INFO][3388] cni-plugin/k8s.go 386: Populated endpoint ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Namespace="calico-system" Pod="calico-kube-controllers-6cdd7cd95d-nhh2l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0", GenerateName:"calico-kube-controllers-6cdd7cd95d-", Namespace:"calico-system", SelfLink:"", UID:"c3a870f1-7b6e-437a-99e2-7212954e3584", ResourceVersion:"896", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdd7cd95d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-6cdd7cd95d-nhh2l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5c536501178", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:37.995857 env[1206]: 2025-05-15 10:48:37.945 [INFO][3388] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Namespace="calico-system" Pod="calico-kube-controllers-6cdd7cd95d-nhh2l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.995857 env[1206]: 2025-05-15 10:48:37.945 [INFO][3388] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5c536501178 ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Namespace="calico-system" Pod="calico-kube-controllers-6cdd7cd95d-nhh2l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.995857 env[1206]: 2025-05-15 10:48:37.954 [INFO][3388] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Namespace="calico-system" Pod="calico-kube-controllers-6cdd7cd95d-nhh2l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:37.995857 env[1206]: 2025-05-15 10:48:37.955 [INFO][3388] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Namespace="calico-system" Pod="calico-kube-controllers-6cdd7cd95d-nhh2l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0", GenerateName:"calico-kube-controllers-6cdd7cd95d-", Namespace:"calico-system", SelfLink:"", UID:"c3a870f1-7b6e-437a-99e2-7212954e3584", ResourceVersion:"896", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdd7cd95d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045", Pod:"calico-kube-controllers-6cdd7cd95d-nhh2l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5c536501178", MAC:"46:7f:a0:0e:d5:b0", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:37.995857 env[1206]: 2025-05-15 10:48:37.988 [INFO][3388] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045" Namespace="calico-system" Pod="calico-kube-controllers-6cdd7cd95d-nhh2l" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:38.018955 env[1206]: time="2025-05-15T10:48:38.018898382Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:48:38.019139 env[1206]: time="2025-05-15T10:48:38.019115936Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:48:38.019234 env[1206]: time="2025-05-15T10:48:38.019211718Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:48:38.019585 env[1206]: time="2025-05-15T10:48:38.019519672Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045 pid=3478 runtime=io.containerd.runc.v2 May 15 10:48:38.029719 systemd[1]: Started cri-containerd-74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045.scope. May 15 10:48:38.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit: BPF prog-id=131 op=LOAD May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734626638626661333164343631363338343839316639663832373331 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734626638626661333164343631363338343839316639663832373331 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit: BPF prog-id=132 op=LOAD May 15 10:48:38.039000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c00027dd90 items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734626638626661333164343631363338343839316639663832373331 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit: BPF prog-id=133 op=LOAD May 15 10:48:38.039000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c00027ddd8 items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734626638626661333164343631363338343839316639663832373331 May 15 10:48:38.039000 audit: BPF prog-id=133 op=UNLOAD May 15 10:48:38.039000 audit: BPF prog-id=132 op=UNLOAD May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { perfmon } for pid=3488 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit[3488]: AVC avc: denied { bpf } for pid=3488 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.039000 audit: BPF prog-id=134 op=LOAD May 15 10:48:38.039000 audit[3488]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003f41e8 items=0 ppid=3478 pid=3488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734626638626661333164343631363338343839316639663832373331 May 15 10:48:38.040858 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:48:38.064985 env[1206]: time="2025-05-15T10:48:38.064870065Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6cdd7cd95d-nhh2l,Uid:c3a870f1-7b6e-437a-99e2-7212954e3584,Namespace:calico-system,Attempt:1,} returns sandbox id \"74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045\"" May 15 10:48:38.066713 env[1206]: time="2025-05-15T10:48:38.066686418Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:48:38.106850 systemd-networkd[1037]: califd8f773a64a: Link UP May 15 10:48:38.107793 systemd-networkd[1037]: califd8f773a64a: Gained carrier May 15 10:48:38.108473 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califd8f773a64a: link becomes ready May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.832 [INFO][3394] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.841 [INFO][3394] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--gv8kc-eth0 csi-node-driver- calico-system 65316744-afb1-4edd-8d8b-470eb5f48b0e 895 0 2025-05-15 10:48:12 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-gv8kc eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] califd8f773a64a [] []}} ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Namespace="calico-system" Pod="csi-node-driver-gv8kc" WorkloadEndpoint="localhost-k8s-csi--node--driver--gv8kc-" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.842 [INFO][3394] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Namespace="calico-system" Pod="csi-node-driver-gv8kc" WorkloadEndpoint="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.867 [INFO][3421] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" HandleID="k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.875 [INFO][3421] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" HandleID="k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000308b60), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-gv8kc", "timestamp":"2025-05-15 10:48:37.867727592 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.875 [INFO][3421] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.939 [INFO][3421] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.939 [INFO][3421] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:37.981 [INFO][3421] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.074 [INFO][3421] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.078 [INFO][3421] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.080 [INFO][3421] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.082 [INFO][3421] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.082 [INFO][3421] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.083 [INFO][3421] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1 May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.089 [INFO][3421] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.103 [INFO][3421] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.103 [INFO][3421] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" host="localhost" May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.103 [INFO][3421] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:38.122297 env[1206]: 2025-05-15 10:48:38.103 [INFO][3421] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" HandleID="k8s-pod-network.6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:38.122874 env[1206]: 2025-05-15 10:48:38.105 [INFO][3394] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Namespace="calico-system" Pod="csi-node-driver-gv8kc" WorkloadEndpoint="localhost-k8s-csi--node--driver--gv8kc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gv8kc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"65316744-afb1-4edd-8d8b-470eb5f48b0e", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-gv8kc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califd8f773a64a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:38.122874 env[1206]: 2025-05-15 10:48:38.105 [INFO][3394] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Namespace="calico-system" Pod="csi-node-driver-gv8kc" WorkloadEndpoint="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:38.122874 env[1206]: 2025-05-15 10:48:38.105 [INFO][3394] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to califd8f773a64a ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Namespace="calico-system" Pod="csi-node-driver-gv8kc" WorkloadEndpoint="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:38.122874 env[1206]: 2025-05-15 10:48:38.107 [INFO][3394] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Namespace="calico-system" Pod="csi-node-driver-gv8kc" WorkloadEndpoint="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:38.122874 env[1206]: 2025-05-15 10:48:38.108 [INFO][3394] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Namespace="calico-system" Pod="csi-node-driver-gv8kc" WorkloadEndpoint="localhost-k8s-csi--node--driver--gv8kc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gv8kc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"65316744-afb1-4edd-8d8b-470eb5f48b0e", ResourceVersion:"895", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1", Pod:"csi-node-driver-gv8kc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califd8f773a64a", MAC:"22:f5:54:ed:10:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:38.122874 env[1206]: 2025-05-15 10:48:38.120 [INFO][3394] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1" Namespace="calico-system" Pod="csi-node-driver-gv8kc" WorkloadEndpoint="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:38.138711 env[1206]: time="2025-05-15T10:48:38.138647077Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:48:38.138711 env[1206]: time="2025-05-15T10:48:38.138683760Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:48:38.138711 env[1206]: time="2025-05-15T10:48:38.138695513Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:48:38.139048 env[1206]: time="2025-05-15T10:48:38.139001905Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1 pid=3530 runtime=io.containerd.runc.v2 May 15 10:48:38.147966 systemd[1]: Started cri-containerd-6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1.scope. May 15 10:48:38.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit: BPF prog-id=135 op=LOAD May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3530 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343861626535306232623532313237313965326166616334636466 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3530 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343861626535306232623532313237313965326166616334636466 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit: BPF prog-id=136 op=LOAD May 15 10:48:38.158000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009cf50 items=0 ppid=3530 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343861626535306232623532313237313965326166616334636466 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.158000 audit: BPF prog-id=137 op=LOAD May 15 10:48:38.158000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009cf98 items=0 ppid=3530 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343861626535306232623532313237313965326166616334636466 May 15 10:48:38.159000 audit: BPF prog-id=137 op=UNLOAD May 15 10:48:38.159000 audit: BPF prog-id=136 op=UNLOAD May 15 10:48:38.159000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { perfmon } for pid=3540 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit[3540]: AVC avc: denied { bpf } for pid=3540 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.159000 audit: BPF prog-id=138 op=LOAD May 15 10:48:38.159000 audit[3540]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009d3a8 items=0 ppid=3530 pid=3540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.159000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632343861626535306232623532313237313965326166616334636466 May 15 10:48:38.160033 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:48:38.167421 env[1206]: time="2025-05-15T10:48:38.167387122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-gv8kc,Uid:65316744-afb1-4edd-8d8b-470eb5f48b0e,Namespace:calico-system,Attempt:1,} returns sandbox id \"6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1\"" May 15 10:48:38.301366 env[1206]: time="2025-05-15T10:48:38.298486761Z" level=info msg="StopPodSandbox for \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\"" May 15 10:48:38.301366 env[1206]: time="2025-05-15T10:48:38.298834785Z" level=info msg="StopPodSandbox for \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\"" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.343 [INFO][3595] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.344 [INFO][3595] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" iface="eth0" netns="/var/run/netns/cni-093d2db2-4769-4195-9092-17bc032d487b" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.344 [INFO][3595] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" iface="eth0" netns="/var/run/netns/cni-093d2db2-4769-4195-9092-17bc032d487b" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.344 [INFO][3595] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" iface="eth0" netns="/var/run/netns/cni-093d2db2-4769-4195-9092-17bc032d487b" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.344 [INFO][3595] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.344 [INFO][3595] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.368 [INFO][3612] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.368 [INFO][3612] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.368 [INFO][3612] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.386 [WARNING][3612] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.386 [INFO][3612] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.387 [INFO][3612] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:38.390384 env[1206]: 2025-05-15 10:48:38.388 [INFO][3595] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:38.390963 env[1206]: time="2025-05-15T10:48:38.390929962Z" level=info msg="TearDown network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\" successfully" May 15 10:48:38.391047 env[1206]: time="2025-05-15T10:48:38.391026404Z" level=info msg="StopPodSandbox for \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\" returns successfully" May 15 10:48:38.391990 env[1206]: time="2025-05-15T10:48:38.391942522Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54db556d75-hzxpv,Uid:fd98c940-6651-401b-85a6-d522ed01b648,Namespace:calico-apiserver,Attempt:1,}" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.352 [INFO][3596] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.352 [INFO][3596] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" iface="eth0" netns="/var/run/netns/cni-debc0e06-72cf-0247-f2a8-313bddbe0c0e" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.352 [INFO][3596] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" iface="eth0" netns="/var/run/netns/cni-debc0e06-72cf-0247-f2a8-313bddbe0c0e" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.353 [INFO][3596] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" iface="eth0" netns="/var/run/netns/cni-debc0e06-72cf-0247-f2a8-313bddbe0c0e" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.353 [INFO][3596] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.353 [INFO][3596] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.371 [INFO][3619] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.371 [INFO][3619] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.387 [INFO][3619] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.393 [WARNING][3619] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.393 [INFO][3619] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.394 [INFO][3619] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:38.397868 env[1206]: 2025-05-15 10:48:38.396 [INFO][3596] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:38.398209 env[1206]: time="2025-05-15T10:48:38.397974175Z" level=info msg="TearDown network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\" successfully" May 15 10:48:38.398209 env[1206]: time="2025-05-15T10:48:38.397992541Z" level=info msg="StopPodSandbox for \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\" returns successfully" May 15 10:48:38.398279 kubelet[1952]: E0515 10:48:38.398256 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:38.398585 env[1206]: time="2025-05-15T10:48:38.398555935Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xwdzt,Uid:e401b110-ba0e-4108-a723-ee9c1b540a00,Namespace:kube-system,Attempt:1,}" May 15 10:48:38.427721 kubelet[1952]: E0515 10:48:38.427703 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:38.437770 systemd[1]: run-netns-cni\x2d093d2db2\x2d4769\x2d4195\x2d9092\x2d17bc032d487b.mount: Deactivated successfully. May 15 10:48:38.437843 systemd[1]: run-netns-cni\x2ddebc0e06\x2d72cf\x2d0247\x2df2a8\x2d313bddbe0c0e.mount: Deactivated successfully. May 15 10:48:38.698475 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid55daaf7573: link becomes ready May 15 10:48:38.697134 systemd-networkd[1037]: calid55daaf7573: Link UP May 15 10:48:38.698615 systemd-networkd[1037]: calid55daaf7573: Gained carrier May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.627 [INFO][3651] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.636 [INFO][3651] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0 calico-apiserver-54db556d75- calico-apiserver fd98c940-6651-401b-85a6-d522ed01b648 911 0 2025-05-15 10:48:12 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54db556d75 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-54db556d75-hzxpv eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calid55daaf7573 [] []}} ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-hzxpv" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--hzxpv-" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.636 [INFO][3651] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-hzxpv" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.659 [INFO][3664] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" HandleID="k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.667 [INFO][3664] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" HandleID="k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002df280), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-54db556d75-hzxpv", "timestamp":"2025-05-15 10:48:38.659017216 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.667 [INFO][3664] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.667 [INFO][3664] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.667 [INFO][3664] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.670 [INFO][3664] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.673 [INFO][3664] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.676 [INFO][3664] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.678 [INFO][3664] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.679 [INFO][3664] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.680 [INFO][3664] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.681 [INFO][3664] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9 May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.688 [INFO][3664] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.692 [INFO][3664] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.693 [INFO][3664] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" host="localhost" May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.693 [INFO][3664] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:38.742258 env[1206]: 2025-05-15 10:48:38.693 [INFO][3664] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" HandleID="k8s-pod-network.b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.743007 env[1206]: 2025-05-15 10:48:38.695 [INFO][3651] cni-plugin/k8s.go 386: Populated endpoint ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-hzxpv" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0", GenerateName:"calico-apiserver-54db556d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"fd98c940-6651-401b-85a6-d522ed01b648", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54db556d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-54db556d75-hzxpv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid55daaf7573", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:38.743007 env[1206]: 2025-05-15 10:48:38.695 [INFO][3651] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-hzxpv" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.743007 env[1206]: 2025-05-15 10:48:38.695 [INFO][3651] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calid55daaf7573 ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-hzxpv" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.743007 env[1206]: 2025-05-15 10:48:38.698 [INFO][3651] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-hzxpv" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.743007 env[1206]: 2025-05-15 10:48:38.699 [INFO][3651] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-hzxpv" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0", GenerateName:"calico-apiserver-54db556d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"fd98c940-6651-401b-85a6-d522ed01b648", ResourceVersion:"911", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54db556d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9", Pod:"calico-apiserver-54db556d75-hzxpv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid55daaf7573", MAC:"22:90:bc:25:cf:a6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:38.743007 env[1206]: 2025-05-15 10:48:38.740 [INFO][3651] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-hzxpv" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:38.764901 env[1206]: time="2025-05-15T10:48:38.764763165Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:48:38.764901 env[1206]: time="2025-05-15T10:48:38.764848225Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:48:38.764901 env[1206]: time="2025-05-15T10:48:38.764878846Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:48:38.765221 env[1206]: time="2025-05-15T10:48:38.765100337Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9 pid=3715 runtime=io.containerd.runc.v2 May 15 10:48:38.779418 systemd[1]: Started cri-containerd-b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9.scope. May 15 10:48:38.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit: BPF prog-id=139 op=LOAD May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3715 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238633230353564386165356633346265353736666231333364343437 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3715 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238633230353564386165356633346265353736666231333364343437 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit: BPF prog-id=140 op=LOAD May 15 10:48:38.790000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218a00 items=0 ppid=3715 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238633230353564386165356633346265353736666231333364343437 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit: BPF prog-id=141 op=LOAD May 15 10:48:38.790000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000218a48 items=0 ppid=3715 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238633230353564386165356633346265353736666231333364343437 May 15 10:48:38.790000 audit: BPF prog-id=141 op=UNLOAD May 15 10:48:38.790000 audit: BPF prog-id=140 op=UNLOAD May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { perfmon } for pid=3725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit[3725]: AVC avc: denied { bpf } for pid=3725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.790000 audit: BPF prog-id=142 op=LOAD May 15 10:48:38.790000 audit[3725]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000218e58 items=0 ppid=3715 pid=3725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238633230353564386165356633346265353736666231333364343437 May 15 10:48:38.792017 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:48:38.810695 systemd-networkd[1037]: cali5aa14baf485: Link UP May 15 10:48:38.812500 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5aa14baf485: link becomes ready May 15 10:48:38.812294 systemd-networkd[1037]: cali5aa14baf485: Gained carrier May 15 10:48:38.819205 env[1206]: time="2025-05-15T10:48:38.819162750Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54db556d75-hzxpv,Uid:fd98c940-6651-401b-85a6-d522ed01b648,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9\"" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.665 [INFO][3670] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.673 [INFO][3670] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0 coredns-6f6b679f8f- kube-system e401b110-ba0e-4108-a723-ee9c1b540a00 912 0 2025-05-15 10:47:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-xwdzt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali5aa14baf485 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Namespace="kube-system" Pod="coredns-6f6b679f8f-xwdzt" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xwdzt-" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.673 [INFO][3670] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Namespace="kube-system" Pod="coredns-6f6b679f8f-xwdzt" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.709 [INFO][3688] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" HandleID="k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.768 [INFO][3688] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" HandleID="k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00042cf00), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-xwdzt", "timestamp":"2025-05-15 10:48:38.709141793 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.768 [INFO][3688] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.768 [INFO][3688] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.768 [INFO][3688] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.771 [INFO][3688] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.774 [INFO][3688] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.778 [INFO][3688] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.779 [INFO][3688] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.781 [INFO][3688] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.781 [INFO][3688] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.782 [INFO][3688] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757 May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.790 [INFO][3688] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.805 [INFO][3688] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.805 [INFO][3688] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" host="localhost" May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.805 [INFO][3688] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:38.829377 env[1206]: 2025-05-15 10:48:38.805 [INFO][3688] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" HandleID="k8s-pod-network.1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.829983 env[1206]: 2025-05-15 10:48:38.808 [INFO][3670] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Namespace="kube-system" Pod="coredns-6f6b679f8f-xwdzt" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e401b110-ba0e-4108-a723-ee9c1b540a00", ResourceVersion:"912", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 47, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-xwdzt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5aa14baf485", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:38.829983 env[1206]: 2025-05-15 10:48:38.808 [INFO][3670] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Namespace="kube-system" Pod="coredns-6f6b679f8f-xwdzt" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.829983 env[1206]: 2025-05-15 10:48:38.808 [INFO][3670] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5aa14baf485 ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Namespace="kube-system" Pod="coredns-6f6b679f8f-xwdzt" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.829983 env[1206]: 2025-05-15 10:48:38.812 [INFO][3670] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Namespace="kube-system" Pod="coredns-6f6b679f8f-xwdzt" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.829983 env[1206]: 2025-05-15 10:48:38.812 [INFO][3670] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Namespace="kube-system" Pod="coredns-6f6b679f8f-xwdzt" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e401b110-ba0e-4108-a723-ee9c1b540a00", ResourceVersion:"912", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 47, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757", Pod:"coredns-6f6b679f8f-xwdzt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5aa14baf485", MAC:"22:f9:0d:24:dc:af", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:38.829983 env[1206]: 2025-05-15 10:48:38.827 [INFO][3670] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757" Namespace="kube-system" Pod="coredns-6f6b679f8f-xwdzt" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:38.847872 env[1206]: time="2025-05-15T10:48:38.847798688Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:48:38.847872 env[1206]: time="2025-05-15T10:48:38.847842796Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:48:38.847872 env[1206]: time="2025-05-15T10:48:38.847853427Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:48:38.848063 env[1206]: time="2025-05-15T10:48:38.848020801Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757 pid=3768 runtime=io.containerd.runc.v2 May 15 10:48:38.857174 systemd[1]: Started cri-containerd-1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757.scope. May 15 10:48:38.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.866000 audit: BPF prog-id=143 op=LOAD May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636662616231356663353236323461343639643531336436646262 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636662616231356663353236323461343639643531336436646262 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit: BPF prog-id=144 op=LOAD May 15 10:48:38.867000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000229c10 items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636662616231356663353236323461343639643531336436646262 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit: BPF prog-id=145 op=LOAD May 15 10:48:38.867000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000229c58 items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636662616231356663353236323461343639643531336436646262 May 15 10:48:38.867000 audit: BPF prog-id=145 op=UNLOAD May 15 10:48:38.867000 audit: BPF prog-id=144 op=UNLOAD May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { perfmon } for pid=3777 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit[3777]: AVC avc: denied { bpf } for pid=3777 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:38.867000 audit: BPF prog-id=146 op=LOAD May 15 10:48:38.867000 audit[3777]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00038e068 items=0 ppid=3768 pid=3777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:38.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162636662616231356663353236323461343639643531336436646262 May 15 10:48:38.868681 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:48:38.889037 env[1206]: time="2025-05-15T10:48:38.888999793Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-xwdzt,Uid:e401b110-ba0e-4108-a723-ee9c1b540a00,Namespace:kube-system,Attempt:1,} returns sandbox id \"1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757\"" May 15 10:48:38.890128 kubelet[1952]: E0515 10:48:38.889702 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:38.891633 env[1206]: time="2025-05-15T10:48:38.891585591Z" level=info msg="CreateContainer within sandbox \"1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:48:39.024769 env[1206]: time="2025-05-15T10:48:39.020734537Z" level=info msg="CreateContainer within sandbox \"1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ff6e67ebd13ff376e021bc226b93bee53054070653a3c8ff68bad61644a0898a\"" May 15 10:48:39.025628 env[1206]: time="2025-05-15T10:48:39.025597310Z" level=info msg="StartContainer for \"ff6e67ebd13ff376e021bc226b93bee53054070653a3c8ff68bad61644a0898a\"" May 15 10:48:39.043238 systemd[1]: Started cri-containerd-ff6e67ebd13ff376e021bc226b93bee53054070653a3c8ff68bad61644a0898a.scope. May 15 10:48:39.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.072000 audit: BPF prog-id=147 op=LOAD May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3768 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366536376562643133666633373665303231626332323662393362 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3768 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366536376562643133666633373665303231626332323662393362 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit: BPF prog-id=148 op=LOAD May 15 10:48:39.073000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003083a0 items=0 ppid=3768 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366536376562643133666633373665303231626332323662393362 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit: BPF prog-id=149 op=LOAD May 15 10:48:39.073000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003083e8 items=0 ppid=3768 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366536376562643133666633373665303231626332323662393362 May 15 10:48:39.073000 audit: BPF prog-id=149 op=UNLOAD May 15 10:48:39.073000 audit: BPF prog-id=148 op=UNLOAD May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { perfmon } for pid=3821 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit[3821]: AVC avc: denied { bpf } for pid=3821 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.073000 audit: BPF prog-id=150 op=LOAD May 15 10:48:39.073000 audit[3821]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003087f8 items=0 ppid=3768 pid=3821 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6666366536376562643133666633373665303231626332323662393362 May 15 10:48:39.131725 env[1206]: time="2025-05-15T10:48:39.131658596Z" level=info msg="StartContainer for \"ff6e67ebd13ff376e021bc226b93bee53054070653a3c8ff68bad61644a0898a\" returns successfully" May 15 10:48:39.204156 systemd-networkd[1037]: cali5c536501178: Gained IPv6LL May 15 10:48:39.264570 systemd-networkd[1037]: califd8f773a64a: Gained IPv6LL May 15 10:48:39.297698 env[1206]: time="2025-05-15T10:48:39.297461097Z" level=info msg="StopPodSandbox for \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\"" May 15 10:48:39.297878 env[1206]: time="2025-05-15T10:48:39.297828208Z" level=info msg="StopPodSandbox for \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\"" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.363 [INFO][3895] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.363 [INFO][3895] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" iface="eth0" netns="/var/run/netns/cni-a0562256-dc28-353a-3e0a-023b9a53fb16" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.363 [INFO][3895] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" iface="eth0" netns="/var/run/netns/cni-a0562256-dc28-353a-3e0a-023b9a53fb16" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.363 [INFO][3895] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" iface="eth0" netns="/var/run/netns/cni-a0562256-dc28-353a-3e0a-023b9a53fb16" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.363 [INFO][3895] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.364 [INFO][3895] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.383 [INFO][3911] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.383 [INFO][3911] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.383 [INFO][3911] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.420 [WARNING][3911] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.420 [INFO][3911] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.421 [INFO][3911] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:39.425416 env[1206]: 2025-05-15 10:48:39.423 [INFO][3895] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:39.425991 env[1206]: time="2025-05-15T10:48:39.425563909Z" level=info msg="TearDown network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\" successfully" May 15 10:48:39.425991 env[1206]: time="2025-05-15T10:48:39.425595602Z" level=info msg="StopPodSandbox for \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\" returns successfully" May 15 10:48:39.426042 kubelet[1952]: E0515 10:48:39.425888 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:39.427157 env[1206]: time="2025-05-15T10:48:39.427135271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-82p6n,Uid:f3f5f565-e792-43e5-bf72-d062e6fd07b7,Namespace:kube-system,Attempt:1,}" May 15 10:48:39.433667 kubelet[1952]: E0515 10:48:39.433011 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:39.442621 systemd[1]: run-netns-cni\x2da0562256\x2ddc28\x2d353a\x2d3e0a\x2d023b9a53fb16.mount: Deactivated successfully. May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.420 [INFO][3894] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.420 [INFO][3894] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" iface="eth0" netns="/var/run/netns/cni-1b556cd7-8157-5767-ceb8-35f5a8ca00ac" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.420 [INFO][3894] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" iface="eth0" netns="/var/run/netns/cni-1b556cd7-8157-5767-ceb8-35f5a8ca00ac" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.420 [INFO][3894] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" iface="eth0" netns="/var/run/netns/cni-1b556cd7-8157-5767-ceb8-35f5a8ca00ac" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.420 [INFO][3894] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.420 [INFO][3894] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.441 [INFO][3919] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.441 [INFO][3919] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.441 [INFO][3919] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.446 [WARNING][3919] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.446 [INFO][3919] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.448 [INFO][3919] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:39.452183 env[1206]: 2025-05-15 10:48:39.450 [INFO][3894] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:39.452703 env[1206]: time="2025-05-15T10:48:39.452220975Z" level=info msg="TearDown network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\" successfully" May 15 10:48:39.452703 env[1206]: time="2025-05-15T10:48:39.452250364Z" level=info msg="StopPodSandbox for \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\" returns successfully" May 15 10:48:39.456372 env[1206]: time="2025-05-15T10:48:39.455548007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54db556d75-r6c6b,Uid:fe2f25b9-87c8-4042-8686-41ddfa8c069c,Namespace:calico-apiserver,Attempt:1,}" May 15 10:48:39.455754 systemd[1]: run-netns-cni\x2d1b556cd7\x2d8157\x2d5767\x2dceb8\x2d35f5a8ca00ac.mount: Deactivated successfully. May 15 10:48:39.462136 kubelet[1952]: I0515 10:48:39.462080 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-xwdzt" podStartSLOduration=47.462061971 podStartE2EDuration="47.462061971s" podCreationTimestamp="2025-05-15 10:47:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:48:39.460868763 +0000 UTC m=+55.270504137" watchObservedRunningTime="2025-05-15 10:48:39.462061971 +0000 UTC m=+55.271697356" May 15 10:48:39.489000 audit[3928]: NETFILTER_CFG table=filter:95 family=2 entries=18 op=nft_register_rule pid=3928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:39.489000 audit[3928]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc9de53570 a2=0 a3=7ffc9de5355c items=0 ppid=2098 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.489000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:39.495000 audit[3928]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3928 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:39.495000 audit[3928]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc9de53570 a2=0 a3=0 items=0 ppid=2098 pid=3928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.495000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:39.506000 audit[3930]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=3930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:39.506000 audit[3930]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffff2646610 a2=0 a3=7ffff26465fc items=0 ppid=2098 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:39.515000 audit[3930]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=3930 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:39.515000 audit[3930]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffff2646610 a2=0 a3=7ffff26465fc items=0 ppid=2098 pid=3930 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.515000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:39.695387 systemd-networkd[1037]: cali05774bc90b6: Link UP May 15 10:48:39.697633 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:48:39.697680 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali05774bc90b6: link becomes ready May 15 10:48:39.697761 systemd-networkd[1037]: cali05774bc90b6: Gained carrier May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.563 [INFO][3932] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.594 [INFO][3932] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--82p6n-eth0 coredns-6f6b679f8f- kube-system f3f5f565-e792-43e5-bf72-d062e6fd07b7 934 0 2025-05-15 10:47:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-82p6n eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali05774bc90b6 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Namespace="kube-system" Pod="coredns-6f6b679f8f-82p6n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--82p6n-" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.594 [INFO][3932] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Namespace="kube-system" Pod="coredns-6f6b679f8f-82p6n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.623 [INFO][3948] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" HandleID="k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.632 [INFO][3948] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" HandleID="k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ad360), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-82p6n", "timestamp":"2025-05-15 10:48:39.623200946 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.632 [INFO][3948] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.632 [INFO][3948] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.632 [INFO][3948] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.636 [INFO][3948] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.639 [INFO][3948] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.645 [INFO][3948] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.648 [INFO][3948] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.650 [INFO][3948] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.650 [INFO][3948] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.652 [INFO][3948] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4 May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.674 [INFO][3948] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.691 [INFO][3948] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.691 [INFO][3948] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" host="localhost" May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.691 [INFO][3948] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:39.785246 env[1206]: 2025-05-15 10:48:39.691 [INFO][3948] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" HandleID="k8s-pod-network.487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.785885 env[1206]: 2025-05-15 10:48:39.693 [INFO][3932] cni-plugin/k8s.go 386: Populated endpoint ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Namespace="kube-system" Pod="coredns-6f6b679f8f-82p6n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--82p6n-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f3f5f565-e792-43e5-bf72-d062e6fd07b7", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 47, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-82p6n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05774bc90b6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:39.785885 env[1206]: 2025-05-15 10:48:39.693 [INFO][3932] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Namespace="kube-system" Pod="coredns-6f6b679f8f-82p6n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.785885 env[1206]: 2025-05-15 10:48:39.693 [INFO][3932] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali05774bc90b6 ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Namespace="kube-system" Pod="coredns-6f6b679f8f-82p6n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.785885 env[1206]: 2025-05-15 10:48:39.697 [INFO][3932] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Namespace="kube-system" Pod="coredns-6f6b679f8f-82p6n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.785885 env[1206]: 2025-05-15 10:48:39.698 [INFO][3932] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Namespace="kube-system" Pod="coredns-6f6b679f8f-82p6n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--82p6n-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f3f5f565-e792-43e5-bf72-d062e6fd07b7", ResourceVersion:"934", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 47, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4", Pod:"coredns-6f6b679f8f-82p6n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05774bc90b6", MAC:"b2:82:ca:7b:79:f3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:39.785885 env[1206]: 2025-05-15 10:48:39.783 [INFO][3932] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4" Namespace="kube-system" Pod="coredns-6f6b679f8f-82p6n" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:39.895213 env[1206]: time="2025-05-15T10:48:39.895135743Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:48:39.895213 env[1206]: time="2025-05-15T10:48:39.895176775Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:48:39.895213 env[1206]: time="2025-05-15T10:48:39.895188258Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:48:39.895422 env[1206]: time="2025-05-15T10:48:39.895312366Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4 pid=3999 runtime=io.containerd.runc.v2 May 15 10:48:39.906695 systemd[1]: Started cri-containerd-487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4.scope. May 15 10:48:39.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.914000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.914000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit: BPF prog-id=151 op=LOAD May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3999 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373037363533386666356361313138326164326633316331323662 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3999 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373037363533386666356361313138326164326633316331323662 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit: BPF prog-id=152 op=LOAD May 15 10:48:39.915000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000094d00 items=0 ppid=3999 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373037363533386666356361313138326164326633316331323662 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit: BPF prog-id=153 op=LOAD May 15 10:48:39.915000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000094d48 items=0 ppid=3999 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373037363533386666356361313138326164326633316331323662 May 15 10:48:39.915000 audit: BPF prog-id=153 op=UNLOAD May 15 10:48:39.915000 audit: BPF prog-id=152 op=UNLOAD May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { perfmon } for pid=4008 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit[4008]: AVC avc: denied { bpf } for pid=4008 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:39.915000 audit: BPF prog-id=154 op=LOAD May 15 10:48:39.915000 audit[4008]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000095158 items=0 ppid=3999 pid=4008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:39.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438373037363533386666356361313138326164326633316331323662 May 15 10:48:39.917768 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:48:39.941820 env[1206]: time="2025-05-15T10:48:39.941768117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-82p6n,Uid:f3f5f565-e792-43e5-bf72-d062e6fd07b7,Namespace:kube-system,Attempt:1,} returns sandbox id \"487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4\"" May 15 10:48:39.942483 kubelet[1952]: E0515 10:48:39.942423 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:39.944773 env[1206]: time="2025-05-15T10:48:39.944726565Z" level=info msg="CreateContainer within sandbox \"487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:48:40.096860 systemd-networkd[1037]: cali499fdb27843: Link UP May 15 10:48:40.100978 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali499fdb27843: link becomes ready May 15 10:48:40.100421 systemd-networkd[1037]: cali499fdb27843: Gained carrier May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.728 [INFO][3957] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.786 [INFO][3957] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0 calico-apiserver-54db556d75- calico-apiserver fe2f25b9-87c8-4042-8686-41ddfa8c069c 935 0 2025-05-15 10:48:12 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:54db556d75 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-54db556d75-r6c6b eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali499fdb27843 [] []}} ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-r6c6b" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--r6c6b-" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.786 [INFO][3957] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-r6c6b" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.814 [INFO][3982] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" HandleID="k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.932 [INFO][3982] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" HandleID="k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f6eb0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-54db556d75-r6c6b", "timestamp":"2025-05-15 10:48:39.81439526 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.932 [INFO][3982] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.932 [INFO][3982] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.932 [INFO][3982] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.935 [INFO][3982] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.938 [INFO][3982] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.942 [INFO][3982] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.954 [INFO][3982] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.962 [INFO][3982] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:39.962 [INFO][3982] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:40.039 [INFO][3982] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50 May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:40.056 [INFO][3982] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:40.092 [INFO][3982] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:40.092 [INFO][3982] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" host="localhost" May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:40.093 [INFO][3982] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:40.213304 env[1206]: 2025-05-15 10:48:40.093 [INFO][3982] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" HandleID="k8s-pod-network.be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:40.213934 env[1206]: 2025-05-15 10:48:40.094 [INFO][3957] cni-plugin/k8s.go 386: Populated endpoint ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-r6c6b" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0", GenerateName:"calico-apiserver-54db556d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2f25b9-87c8-4042-8686-41ddfa8c069c", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54db556d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-54db556d75-r6c6b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali499fdb27843", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:40.213934 env[1206]: 2025-05-15 10:48:40.095 [INFO][3957] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-r6c6b" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:40.213934 env[1206]: 2025-05-15 10:48:40.095 [INFO][3957] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali499fdb27843 ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-r6c6b" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:40.213934 env[1206]: 2025-05-15 10:48:40.097 [INFO][3957] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-r6c6b" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:40.213934 env[1206]: 2025-05-15 10:48:40.101 [INFO][3957] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-r6c6b" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0", GenerateName:"calico-apiserver-54db556d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2f25b9-87c8-4042-8686-41ddfa8c069c", ResourceVersion:"935", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54db556d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50", Pod:"calico-apiserver-54db556d75-r6c6b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali499fdb27843", MAC:"7e:63:14:bd:69:b6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:40.213934 env[1206]: 2025-05-15 10:48:40.211 [INFO][3957] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50" Namespace="calico-apiserver" Pod="calico-apiserver-54db556d75-r6c6b" WorkloadEndpoint="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:40.299049 env[1206]: time="2025-05-15T10:48:40.298887383Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:48:40.299049 env[1206]: time="2025-05-15T10:48:40.298923264Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:48:40.299049 env[1206]: time="2025-05-15T10:48:40.298933123Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:48:40.299455 env[1206]: time="2025-05-15T10:48:40.299367649Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50 pid=4077 runtime=io.containerd.runc.v2 May 15 10:48:40.308571 systemd[1]: Started cri-containerd-be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50.scope. May 15 10:48:40.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit: BPF prog-id=155 op=LOAD May 15 10:48:40.318000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4077 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265353837363839303133353838623230383665303535626338343464 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4077 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265353837363839303133353838623230383665303535626338343464 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.318000 audit: BPF prog-id=156 op=LOAD May 15 10:48:40.318000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003bd330 items=0 ppid=4077 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.318000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265353837363839303133353838623230383665303535626338343464 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit: BPF prog-id=157 op=LOAD May 15 10:48:40.319000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003bd378 items=0 ppid=4077 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265353837363839303133353838623230383665303535626338343464 May 15 10:48:40.319000 audit: BPF prog-id=157 op=UNLOAD May 15 10:48:40.319000 audit: BPF prog-id=156 op=UNLOAD May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.319000 audit: BPF prog-id=158 op=LOAD May 15 10:48:40.319000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bd788 items=0 ppid=4077 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.319000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265353837363839303133353838623230383665303535626338343464 May 15 10:48:40.321324 systemd-resolved[1144]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:48:40.325152 env[1206]: time="2025-05-15T10:48:40.325110073Z" level=info msg="CreateContainer within sandbox \"487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a6016e90dc43c961274b060887c2532aa898e3d614c4b8f0d0661df11ffbc425\"" May 15 10:48:40.325634 env[1206]: time="2025-05-15T10:48:40.325609439Z" level=info msg="StartContainer for \"a6016e90dc43c961274b060887c2532aa898e3d614c4b8f0d0661df11ffbc425\"" May 15 10:48:40.346953 systemd[1]: Started cri-containerd-a6016e90dc43c961274b060887c2532aa898e3d614c4b8f0d0661df11ffbc425.scope. May 15 10:48:40.349557 env[1206]: time="2025-05-15T10:48:40.349523831Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-54db556d75-r6c6b,Uid:fe2f25b9-87c8-4042-8686-41ddfa8c069c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50\"" May 15 10:48:40.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit: BPF prog-id=159 op=LOAD May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3999 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136303136653930646334336339363132373462303630383837633235 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3999 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136303136653930646334336339363132373462303630383837633235 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit: BPF prog-id=160 op=LOAD May 15 10:48:40.357000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000024d60 items=0 ppid=3999 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136303136653930646334336339363132373462303630383837633235 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit: BPF prog-id=161 op=LOAD May 15 10:48:40.357000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000024da8 items=0 ppid=3999 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136303136653930646334336339363132373462303630383837633235 May 15 10:48:40.357000 audit: BPF prog-id=161 op=UNLOAD May 15 10:48:40.357000 audit: BPF prog-id=160 op=UNLOAD May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { perfmon } for pid=4111 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit[4111]: AVC avc: denied { bpf } for pid=4111 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:40.357000 audit: BPF prog-id=162 op=LOAD May 15 10:48:40.357000 audit[4111]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000251b8 items=0 ppid=3999 pid=4111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.357000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136303136653930646334336339363132373462303630383837633235 May 15 10:48:40.398156 env[1206]: time="2025-05-15T10:48:40.398117341Z" level=info msg="StartContainer for \"a6016e90dc43c961274b060887c2532aa898e3d614c4b8f0d0661df11ffbc425\" returns successfully" May 15 10:48:40.437352 kubelet[1952]: E0515 10:48:40.437056 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:40.437352 kubelet[1952]: E0515 10:48:40.437249 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:40.480585 systemd-networkd[1037]: calid55daaf7573: Gained IPv6LL May 15 10:48:40.497000 audit[4148]: NETFILTER_CFG table=filter:99 family=2 entries=12 op=nft_register_rule pid=4148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:40.497000 audit[4148]: SYSCALL arch=c000003e syscall=46 success=yes exit=4504 a0=3 a1=7ffd546fa1f0 a2=0 a3=7ffd546fa1dc items=0 ppid=2098 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.497000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:40.501000 audit[4148]: NETFILTER_CFG table=nat:100 family=2 entries=42 op=nft_register_rule pid=4148 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:40.501000 audit[4148]: SYSCALL arch=c000003e syscall=46 success=yes exit=13428 a0=3 a1=7ffd546fa1f0 a2=0 a3=7ffd546fa1dc items=0 ppid=2098 pid=4148 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:40.501000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:40.800639 systemd-networkd[1037]: cali05774bc90b6: Gained IPv6LL May 15 10:48:40.801035 systemd-networkd[1037]: cali5aa14baf485: Gained IPv6LL May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit: BPF prog-id=163 op=LOAD May 15 10:48:41.294000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd712cdcb0 a2=98 a3=3 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.294000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.294000 audit: BPF prog-id=163 op=UNLOAD May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit: BPF prog-id=164 op=LOAD May 15 10:48:41.294000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd712cda90 a2=74 a3=540051 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.294000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.294000 audit: BPF prog-id=164 op=UNLOAD May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.294000 audit: BPF prog-id=165 op=LOAD May 15 10:48:41.294000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd712cdac0 a2=94 a3=2 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.294000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.294000 audit: BPF prog-id=165 op=UNLOAD May 15 10:48:41.416000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit: BPF prog-id=166 op=LOAD May 15 10:48:41.416000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd712cd980 a2=40 a3=1 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.416000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.416000 audit: BPF prog-id=166 op=UNLOAD May 15 10:48:41.416000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.416000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd712cda50 a2=50 a3=7ffd712cdb30 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.416000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd712cd990 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd712cd9c0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd712cd8d0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd712cd9e0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd712cd9c0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd712cd9b0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd712cd9e0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd712cd9c0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd712cd9e0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.423000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.423000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffd712cd9b0 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.423000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd712cda20 a2=28 a3=0 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd712cd7d0 a2=50 a3=1 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit: BPF prog-id=167 op=LOAD May 15 10:48:41.424000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd712cd7d0 a2=94 a3=5 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.424000 audit: BPF prog-id=167 op=UNLOAD May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd712cd880 a2=50 a3=1 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffd712cd9a0 a2=4 a3=38 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { confidentiality } for pid=4189 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:48:41.424000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd712cd9f0 a2=94 a3=6 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { confidentiality } for pid=4189 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:48:41.424000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd712cd1a0 a2=94 a3=83 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { perfmon } for pid=4189 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { bpf } for pid=4189 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.424000 audit[4189]: AVC avc: denied { confidentiality } for pid=4189 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:48:41.424000 audit[4189]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffd712cd1a0 a2=94 a3=83 items=0 ppid=4151 pid=4189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.424000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:48:41.431000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit: BPF prog-id=168 op=LOAD May 15 10:48:41.431000 audit[4214]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff867fc5b0 a2=98 a3=1999999999999999 items=0 ppid=4151 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.431000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:48:41.431000 audit: BPF prog-id=168 op=UNLOAD May 15 10:48:41.431000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.431000 audit: BPF prog-id=169 op=LOAD May 15 10:48:41.431000 audit[4214]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff867fc490 a2=74 a3=ffff items=0 ppid=4151 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.431000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:48:41.432000 audit: BPF prog-id=169 op=UNLOAD May 15 10:48:41.432000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit[4214]: AVC avc: denied { perfmon } for pid=4214 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit[4214]: AVC avc: denied { bpf } for pid=4214 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.432000 audit: BPF prog-id=170 op=LOAD May 15 10:48:41.432000 audit[4214]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff867fc4d0 a2=40 a3=7fff867fc6b0 items=0 ppid=4151 pid=4214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.432000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:48:41.432000 audit: BPF prog-id=170 op=UNLOAD May 15 10:48:41.439050 kubelet[1952]: E0515 10:48:41.438858 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:41.451246 kubelet[1952]: I0515 10:48:41.451157 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-82p6n" podStartSLOduration=49.451135142 podStartE2EDuration="49.451135142s" podCreationTimestamp="2025-05-15 10:47:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:48:40.478629044 +0000 UTC m=+56.288264428" watchObservedRunningTime="2025-05-15 10:48:41.451135142 +0000 UTC m=+57.260770526" May 15 10:48:41.484232 systemd-networkd[1037]: vxlan.calico: Link UP May 15 10:48:41.484241 systemd-networkd[1037]: vxlan.calico: Gained carrier May 15 10:48:41.500000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.500000 audit: BPF prog-id=171 op=LOAD May 15 10:48:41.500000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2ff65270 a2=98 a3=ffffffff items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.500000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.501000 audit: BPF prog-id=171 op=UNLOAD May 15 10:48:41.501000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.501000 audit: BPF prog-id=172 op=LOAD May 15 10:48:41.501000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2ff65080 a2=74 a3=540051 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.501000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.502000 audit: BPF prog-id=172 op=UNLOAD May 15 10:48:41.502000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.502000 audit: BPF prog-id=173 op=LOAD May 15 10:48:41.502000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe2ff650b0 a2=94 a3=2 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.502000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.503000 audit: BPF prog-id=173 op=UNLOAD May 15 10:48:41.503000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.503000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ff64f80 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.503000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.503000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ff64fb0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.503000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.503000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ff64ec0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.503000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.504000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.504000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ff64fd0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.504000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.504000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.504000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ff64fb0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.504000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.504000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.504000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ff64fa0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.504000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.504000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.504000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ff64fd0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.504000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.504000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.504000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ff64fb0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.504000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.504000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.504000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ff64fd0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.504000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.504000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.504000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe2ff64fa0 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.504000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe2ff65010 a2=28 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit: BPF prog-id=174 op=LOAD May 15 10:48:41.505000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2ff64e80 a2=40 a3=0 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.505000 audit: BPF prog-id=174 op=UNLOAD May 15 10:48:41.505000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.505000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe2ff64e70 a2=50 a3=2800 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.505000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.506000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.506000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe2ff64e70 a2=50 a3=2800 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.506000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit: BPF prog-id=175 op=LOAD May 15 10:48:41.507000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2ff64690 a2=94 a3=2 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.507000 audit: BPF prog-id=175 op=UNLOAD May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.507000 audit: BPF prog-id=176 op=LOAD May 15 10:48:41.507000 audit[4240]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe2ff64790 a2=94 a3=30 items=0 ppid=4151 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.507000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.512000 audit: BPF prog-id=177 op=LOAD May 15 10:48:41.512000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff307c6b30 a2=98 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.512000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.513000 audit: BPF prog-id=177 op=UNLOAD May 15 10:48:41.513000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.513000 audit: BPF prog-id=178 op=LOAD May 15 10:48:41.513000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff307c6910 a2=74 a3=540051 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.513000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.514000 audit: BPF prog-id=178 op=UNLOAD May 15 10:48:41.514000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.514000 audit: BPF prog-id=179 op=LOAD May 15 10:48:41.514000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff307c6940 a2=94 a3=2 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.514000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.514000 audit: BPF prog-id=179 op=UNLOAD May 15 10:48:41.527000 audit[4252]: NETFILTER_CFG table=filter:101 family=2 entries=11 op=nft_register_rule pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:41.527000 audit[4252]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff7c4ec910 a2=0 a3=7fff7c4ec8fc items=0 ppid=2098 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:41.543000 audit[4252]: NETFILTER_CFG table=nat:102 family=2 entries=61 op=nft_register_chain pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:41.543000 audit[4252]: SYSCALL arch=c000003e syscall=46 success=yes exit=22668 a0=3 a1=7fff7c4ec910 a2=0 a3=7fff7c4ec8fc items=0 ppid=2098 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.543000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.625347 kernel: kauditd_printk_skb: 861 callbacks suppressed May 15 10:48:41.625418 kernel: audit: type=1400 audit(1747306121.622:1270): avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.631687 kernel: audit: type=1400 audit(1747306121.622:1270): avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.639352 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:48:41.639398 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 May 15 10:48:41.639413 kernel: audit: backlog limit exceeded May 15 10:48:41.640005 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.640930 kernel: audit: type=1400 audit(1747306121.622:1270): avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.640971 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 May 15 10:48:41.644155 kernel: audit: type=1400 audit(1747306121.622:1270): avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.644186 kernel: audit: type=1400 audit(1747306121.622:1270): avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.622000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.622000 audit: BPF prog-id=180 op=LOAD May 15 10:48:41.622000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff307c6800 a2=40 a3=1 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.622000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.627000 audit: BPF prog-id=180 op=UNLOAD May 15 10:48:41.627000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.627000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff307c68d0 a2=50 a3=7fff307c69b0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.627000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff307c6810 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff307c6840 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff307c6750 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff307c6860 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff307c6840 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff307c6830 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff307c6860 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff307c6840 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff307c6860 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff307c6830 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff307c68a0 a2=28 a3=0 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff307c6650 a2=50 a3=1 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.635000 audit: BPF prog-id=181 op=LOAD May 15 10:48:41.635000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff307c6650 a2=94 a3=5 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.635000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.650000 audit: BPF prog-id=181 op=UNLOAD May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff307c6700 a2=50 a3=1 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.650000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff307c6820 a2=4 a3=38 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.650000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { confidentiality } for pid=4250 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:48:41.650000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff307c6870 a2=94 a3=6 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.650000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { confidentiality } for pid=4250 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:48:41.650000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff307c6020 a2=94 a3=83 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.650000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { perfmon } for pid=4250 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.650000 audit[4250]: AVC avc: denied { confidentiality } for pid=4250 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:48:41.650000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff307c6020 a2=94 a3=83 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.650000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.651000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.651000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff307c7a60 a2=10 a3=208 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.651000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.651000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.651000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff307c7900 a2=10 a3=3 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.651000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.651000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.651000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff307c78a0 a2=10 a3=3 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.651000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.651000 audit[4250]: AVC avc: denied { bpf } for pid=4250 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.651000 audit[4250]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff307c78a0 a2=10 a3=7 items=0 ppid=4151 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.651000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:48:41.659000 audit: BPF prog-id=176 op=UNLOAD May 15 10:48:41.724013 env[1206]: time="2025-05-15T10:48:41.723962394Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:41.726713 env[1206]: time="2025-05-15T10:48:41.726613530Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:41.732156 env[1206]: time="2025-05-15T10:48:41.732121814Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:41.733000 audit[4281]: NETFILTER_CFG table=mangle:103 family=2 entries=16 op=nft_register_chain pid=4281 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:48:41.733000 audit[4281]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe613fb780 a2=0 a3=7ffe613fb76c items=0 ppid=4151 pid=4281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.733000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:48:41.738464 env[1206]: time="2025-05-15T10:48:41.737510510Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:41.738464 env[1206]: time="2025-05-15T10:48:41.737776940Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 10:48:41.741068 env[1206]: time="2025-05-15T10:48:41.741043221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:48:41.747411 env[1206]: time="2025-05-15T10:48:41.745294052Z" level=info msg="CreateContainer within sandbox \"74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:48:41.745000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:41.745000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001c797c0 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:48:41.745000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:48:41.748000 audit[4280]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=4280 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:48:41.748000 audit[4280]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffdc9dd1eb0 a2=0 a3=7ffdc9dd1e9c items=0 ppid=4151 pid=4280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.748000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:48:41.749000 audit[4282]: NETFILTER_CFG table=nat:105 family=2 entries=15 op=nft_register_chain pid=4282 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:48:41.749000 audit[4282]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7fffe2ec0400 a2=0 a3=7fffe2ec03ec items=0 ppid=4151 pid=4282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.749000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:48:41.750000 audit[4285]: NETFILTER_CFG table=filter:106 family=2 entries=215 op=nft_register_chain pid=4285 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:48:41.750000 audit[4285]: SYSCALL arch=c000003e syscall=46 success=yes exit=125772 a0=3 a1=7ffe21b1f470 a2=0 a3=7ffe21b1f45c items=0 ppid=4151 pid=4285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:48:41.752000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:41.752000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0020f0480 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:48:41.752000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:48:41.760180 env[1206]: time="2025-05-15T10:48:41.760126424Z" level=info msg="CreateContainer within sandbox \"74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e3abb424051d03c2fcdbab3861b9119f35da688830d6a8c7a397309d32e84cd9\"" May 15 10:48:41.760864 env[1206]: time="2025-05-15T10:48:41.760842830Z" level=info msg="StartContainer for \"e3abb424051d03c2fcdbab3861b9119f35da688830d6a8c7a397309d32e84cd9\"" May 15 10:48:41.776287 systemd[1]: Started sshd@15-10.0.0.140:22-10.0.0.1:59024.service. May 15 10:48:41.774000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.140:22-10.0.0.1:59024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:41.781506 systemd[1]: Started cri-containerd-e3abb424051d03c2fcdbab3861b9119f35da688830d6a8c7a397309d32e84cd9.scope. May 15 10:48:41.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.793000 audit: BPF prog-id=182 op=LOAD May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3478 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616262343234303531643033633266636462616233383631623931 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3478 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616262343234303531643033633266636462616233383631623931 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit: BPF prog-id=183 op=LOAD May 15 10:48:41.794000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c8dc0 items=0 ppid=3478 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616262343234303531643033633266636462616233383631623931 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.794000 audit: BPF prog-id=184 op=LOAD May 15 10:48:41.794000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c8e08 items=0 ppid=3478 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616262343234303531643033633266636462616233383631623931 May 15 10:48:41.796000 audit: BPF prog-id=184 op=UNLOAD May 15 10:48:41.796000 audit: BPF prog-id=183 op=UNLOAD May 15 10:48:41.796000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { perfmon } for pid=4298 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit[4298]: AVC avc: denied { bpf } for pid=4298 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:41.796000 audit: BPF prog-id=185 op=LOAD May 15 10:48:41.796000 audit[4298]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002c9218 items=0 ppid=3478 pid=4298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533616262343234303531643033633266636462616233383631623931 May 15 10:48:41.824000 audit[4308]: USER_ACCT pid=4308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:41.826530 sshd[4308]: Accepted publickey for core from 10.0.0.1 port 59024 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:41.825000 audit[4308]: CRED_ACQ pid=4308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:41.826000 audit[4308]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca0009c40 a2=3 a3=0 items=0 ppid=1 pid=4308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:41.826000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:41.828328 sshd[4308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:41.834219 systemd[1]: Started session-16.scope. May 15 10:48:41.834792 systemd-logind[1196]: New session 16 of user core. May 15 10:48:41.839000 audit[4308]: USER_START pid=4308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:41.840000 audit[4329]: CRED_ACQ pid=4329 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:41.888571 systemd-networkd[1037]: cali499fdb27843: Gained IPv6LL May 15 10:48:42.078336 env[1206]: time="2025-05-15T10:48:42.078239904Z" level=info msg="StartContainer for \"e3abb424051d03c2fcdbab3861b9119f35da688830d6a8c7a397309d32e84cd9\" returns successfully" May 15 10:48:42.077000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:42.077000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c007b3fc50 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:48:42.077000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:48:42.077000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:42.077000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0080fa880 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:48:42.077000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:48:42.078000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:42.078000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c007b3fef0 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:48:42.078000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:48:42.078000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:42.078000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0080fa8a0 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:48:42.078000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:48:42.078000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:42.078000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0076727e0 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:48:42.078000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:48:42.079000 audit[1837]: AVC avc: denied { watch } for pid=1837 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:42.079000 audit[1837]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c007b48000 a2=fc6 a3=0 items=0 ppid=1683 pid=1837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c647 key=(null) May 15 10:48:42.079000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313430002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 May 15 10:48:42.162616 sshd[4308]: pam_unix(sshd:session): session closed for user core May 15 10:48:42.162000 audit[4308]: USER_END pid=4308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:42.162000 audit[4308]: CRED_DISP pid=4308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:42.165496 systemd[1]: sshd@15-10.0.0.140:22-10.0.0.1:59024.service: Deactivated successfully. May 15 10:48:42.164000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.140:22-10.0.0.1:59024 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:42.166231 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:48:42.167103 systemd-logind[1196]: Session 16 logged out. Waiting for processes to exit. May 15 10:48:42.167795 systemd-logind[1196]: Removed session 16. May 15 10:48:42.442255 kubelet[1952]: E0515 10:48:42.442223 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:43.221138 env[1206]: time="2025-05-15T10:48:43.221078877Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:43.223312 env[1206]: time="2025-05-15T10:48:43.223259201Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:43.224913 env[1206]: time="2025-05-15T10:48:43.224885424Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:43.226361 env[1206]: time="2025-05-15T10:48:43.226325436Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:43.226780 env[1206]: time="2025-05-15T10:48:43.226734399Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 10:48:43.228139 env[1206]: time="2025-05-15T10:48:43.227949805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:48:43.228907 env[1206]: time="2025-05-15T10:48:43.228865145Z" level=info msg="CreateContainer within sandbox \"6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:48:43.306923 env[1206]: time="2025-05-15T10:48:43.306152536Z" level=info msg="CreateContainer within sandbox \"6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ac1ec0abc888ae7e097e22794eafb904e920c8c642ac5fa093b21772835e3a84\"" May 15 10:48:43.307694 env[1206]: time="2025-05-15T10:48:43.307664121Z" level=info msg="StartContainer for \"ac1ec0abc888ae7e097e22794eafb904e920c8c642ac5fa093b21772835e3a84\"" May 15 10:48:43.343271 systemd[1]: run-containerd-runc-k8s.io-ac1ec0abc888ae7e097e22794eafb904e920c8c642ac5fa093b21772835e3a84-runc.6wYY7u.mount: Deactivated successfully. May 15 10:48:43.350261 systemd[1]: Started cri-containerd-ac1ec0abc888ae7e097e22794eafb904e920c8c642ac5fa093b21772835e3a84.scope. May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f2c44d4ca88 items=0 ppid=3530 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:43.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316563306162633838386165376530393765323237393465616662 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit: BPF prog-id=186 op=LOAD May 15 10:48:43.392000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022d498 items=0 ppid=3530 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:43.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316563306162633838386165376530393765323237393465616662 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit: BPF prog-id=187 op=LOAD May 15 10:48:43.392000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022d4e8 items=0 ppid=3530 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:43.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316563306162633838386165376530393765323237393465616662 May 15 10:48:43.392000 audit: BPF prog-id=187 op=UNLOAD May 15 10:48:43.392000 audit: BPF prog-id=186 op=UNLOAD May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { perfmon } for pid=4352 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit[4352]: AVC avc: denied { bpf } for pid=4352 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:43.392000 audit: BPF prog-id=188 op=LOAD May 15 10:48:43.392000 audit[4352]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022d578 items=0 ppid=3530 pid=4352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:43.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163316563306162633838386165376530393765323237393465616662 May 15 10:48:43.446101 env[1206]: time="2025-05-15T10:48:43.446048589Z" level=info msg="StartContainer for \"ac1ec0abc888ae7e097e22794eafb904e920c8c642ac5fa093b21772835e3a84\" returns successfully" May 15 10:48:43.448130 kubelet[1952]: E0515 10:48:43.448002 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:43.490111 systemd-networkd[1037]: vxlan.calico: Gained IPv6LL May 15 10:48:43.496960 kubelet[1952]: I0515 10:48:43.496906 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6cdd7cd95d-nhh2l" podStartSLOduration=27.824108423 podStartE2EDuration="31.49688904s" podCreationTimestamp="2025-05-15 10:48:12 +0000 UTC" firstStartedPulling="2025-05-15 10:48:38.066176901 +0000 UTC m=+53.875812286" lastFinishedPulling="2025-05-15 10:48:41.738957519 +0000 UTC m=+57.548592903" observedRunningTime="2025-05-15 10:48:42.452850933 +0000 UTC m=+58.262486317" watchObservedRunningTime="2025-05-15 10:48:43.49688904 +0000 UTC m=+59.306524424" May 15 10:48:44.287183 env[1206]: time="2025-05-15T10:48:44.287145313Z" level=info msg="StopPodSandbox for \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\"" May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.317 [WARNING][4416] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--82p6n-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f3f5f565-e792-43e5-bf72-d062e6fd07b7", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 47, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4", Pod:"coredns-6f6b679f8f-82p6n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05774bc90b6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.317 [INFO][4416] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.317 [INFO][4416] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" iface="eth0" netns="" May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.317 [INFO][4416] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.318 [INFO][4416] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.335 [INFO][4428] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.335 [INFO][4428] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.335 [INFO][4428] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.339 [WARNING][4428] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.339 [INFO][4428] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.340 [INFO][4428] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.343093 env[1206]: 2025-05-15 10:48:44.341 [INFO][4416] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:44.343565 env[1206]: time="2025-05-15T10:48:44.343140212Z" level=info msg="TearDown network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\" successfully" May 15 10:48:44.343565 env[1206]: time="2025-05-15T10:48:44.343199230Z" level=info msg="StopPodSandbox for \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\" returns successfully" May 15 10:48:44.343785 env[1206]: time="2025-05-15T10:48:44.343749713Z" level=info msg="RemovePodSandbox for \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\"" May 15 10:48:44.343835 env[1206]: time="2025-05-15T10:48:44.343785825Z" level=info msg="Forcibly stopping sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\"" May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.372 [WARNING][4451] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--82p6n-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"f3f5f565-e792-43e5-bf72-d062e6fd07b7", ResourceVersion:"984", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 47, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"487076538ff5ca1182ad2f31c126bdac95b7182f81103f4e034e8830eb1106b4", Pod:"coredns-6f6b679f8f-82p6n", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali05774bc90b6", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.372 [INFO][4451] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.372 [INFO][4451] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" iface="eth0" netns="" May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.372 [INFO][4451] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.372 [INFO][4451] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.390 [INFO][4460] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.390 [INFO][4460] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.390 [INFO][4460] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.395 [WARNING][4460] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.395 [INFO][4460] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" HandleID="k8s-pod-network.def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" Workload="localhost-k8s-coredns--6f6b679f8f--82p6n-eth0" May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.397 [INFO][4460] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.399748 env[1206]: 2025-05-15 10:48:44.398 [INFO][4451] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3" May 15 10:48:44.400208 env[1206]: time="2025-05-15T10:48:44.399775655Z" level=info msg="TearDown network for sandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\" successfully" May 15 10:48:44.405171 env[1206]: time="2025-05-15T10:48:44.405136545Z" level=info msg="RemovePodSandbox \"def1f20ff8e4d24d3acd4c299cce56d2c73eb1a29f0747542b31f539de450ff3\" returns successfully" May 15 10:48:44.405779 env[1206]: time="2025-05-15T10:48:44.405749392Z" level=info msg="StopPodSandbox for \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\"" May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.437 [WARNING][4483] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e401b110-ba0e-4108-a723-ee9c1b540a00", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 47, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757", Pod:"coredns-6f6b679f8f-xwdzt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5aa14baf485", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.437 [INFO][4483] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.437 [INFO][4483] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" iface="eth0" netns="" May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.437 [INFO][4483] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.437 [INFO][4483] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.456 [INFO][4491] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.456 [INFO][4491] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.456 [INFO][4491] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.461 [WARNING][4491] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.461 [INFO][4491] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.462 [INFO][4491] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.465157 env[1206]: 2025-05-15 10:48:44.464 [INFO][4483] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:44.465614 env[1206]: time="2025-05-15T10:48:44.465168826Z" level=info msg="TearDown network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\" successfully" May 15 10:48:44.465614 env[1206]: time="2025-05-15T10:48:44.465199497Z" level=info msg="StopPodSandbox for \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\" returns successfully" May 15 10:48:44.465684 env[1206]: time="2025-05-15T10:48:44.465652777Z" level=info msg="RemovePodSandbox for \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\"" May 15 10:48:44.465725 env[1206]: time="2025-05-15T10:48:44.465691825Z" level=info msg="Forcibly stopping sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\"" May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.501 [WARNING][4514] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"e401b110-ba0e-4108-a723-ee9c1b540a00", ResourceVersion:"940", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 47, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1bcfbab15fc52624a469d513d6dbb8095d81e007adf542388ea023c7a2c99757", Pod:"coredns-6f6b679f8f-xwdzt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali5aa14baf485", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.501 [INFO][4514] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.501 [INFO][4514] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" iface="eth0" netns="" May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.501 [INFO][4514] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.501 [INFO][4514] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.519 [INFO][4523] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.519 [INFO][4523] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.519 [INFO][4523] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.524 [WARNING][4523] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.524 [INFO][4523] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" HandleID="k8s-pod-network.9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" Workload="localhost-k8s-coredns--6f6b679f8f--xwdzt-eth0" May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.525 [INFO][4523] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.528543 env[1206]: 2025-05-15 10:48:44.527 [INFO][4514] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0" May 15 10:48:44.529022 env[1206]: time="2025-05-15T10:48:44.528558236Z" level=info msg="TearDown network for sandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\" successfully" May 15 10:48:44.531464 env[1206]: time="2025-05-15T10:48:44.531422727Z" level=info msg="RemovePodSandbox \"9a261263c78b5354df3696c834bf930d432f2bc731f1f34c913d14a84fc738e0\" returns successfully" May 15 10:48:44.531927 env[1206]: time="2025-05-15T10:48:44.531895456Z" level=info msg="StopPodSandbox for \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\"" May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.561 [WARNING][4545] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gv8kc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"65316744-afb1-4edd-8d8b-470eb5f48b0e", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1", Pod:"csi-node-driver-gv8kc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califd8f773a64a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.561 [INFO][4545] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.561 [INFO][4545] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" iface="eth0" netns="" May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.561 [INFO][4545] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.561 [INFO][4545] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.579 [INFO][4553] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.579 [INFO][4553] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.579 [INFO][4553] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.583 [WARNING][4553] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.583 [INFO][4553] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.585 [INFO][4553] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.588083 env[1206]: 2025-05-15 10:48:44.586 [INFO][4545] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:44.588083 env[1206]: time="2025-05-15T10:48:44.588031406Z" level=info msg="TearDown network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\" successfully" May 15 10:48:44.588083 env[1206]: time="2025-05-15T10:48:44.588062468Z" level=info msg="StopPodSandbox for \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\" returns successfully" May 15 10:48:44.588693 env[1206]: time="2025-05-15T10:48:44.588593734Z" level=info msg="RemovePodSandbox for \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\"" May 15 10:48:44.588693 env[1206]: time="2025-05-15T10:48:44.588626518Z" level=info msg="Forcibly stopping sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\"" May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.620 [WARNING][4577] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--gv8kc-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"65316744-afb1-4edd-8d8b-470eb5f48b0e", ResourceVersion:"906", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1", Pod:"csi-node-driver-gv8kc", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"califd8f773a64a", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.621 [INFO][4577] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.621 [INFO][4577] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" iface="eth0" netns="" May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.621 [INFO][4577] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.621 [INFO][4577] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.640 [INFO][4585] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.641 [INFO][4585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.641 [INFO][4585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.647 [WARNING][4585] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.647 [INFO][4585] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" HandleID="k8s-pod-network.40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" Workload="localhost-k8s-csi--node--driver--gv8kc-eth0" May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.648 [INFO][4585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.653365 env[1206]: 2025-05-15 10:48:44.652 [INFO][4577] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99" May 15 10:48:44.653831 env[1206]: time="2025-05-15T10:48:44.653380450Z" level=info msg="TearDown network for sandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\" successfully" May 15 10:48:44.656599 env[1206]: time="2025-05-15T10:48:44.656570687Z" level=info msg="RemovePodSandbox \"40cd7ff62c16b9577d1b40be711fc5eec67b238e9615e25cde2e2518fab16d99\" returns successfully" May 15 10:48:44.657019 env[1206]: time="2025-05-15T10:48:44.656988568Z" level=info msg="StopPodSandbox for \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\"" May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.689 [WARNING][4608] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0", GenerateName:"calico-apiserver-54db556d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2f25b9-87c8-4042-8686-41ddfa8c069c", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54db556d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50", Pod:"calico-apiserver-54db556d75-r6c6b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali499fdb27843", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.689 [INFO][4608] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.689 [INFO][4608] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" iface="eth0" netns="" May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.689 [INFO][4608] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.689 [INFO][4608] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.714 [INFO][4617] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.714 [INFO][4617] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.714 [INFO][4617] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.720 [WARNING][4617] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.720 [INFO][4617] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.721 [INFO][4617] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.724609 env[1206]: 2025-05-15 10:48:44.723 [INFO][4608] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:44.725105 env[1206]: time="2025-05-15T10:48:44.724637229Z" level=info msg="TearDown network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\" successfully" May 15 10:48:44.725105 env[1206]: time="2025-05-15T10:48:44.724671137Z" level=info msg="StopPodSandbox for \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\" returns successfully" May 15 10:48:44.725255 env[1206]: time="2025-05-15T10:48:44.725204446Z" level=info msg="RemovePodSandbox for \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\"" May 15 10:48:44.725508 env[1206]: time="2025-05-15T10:48:44.725247742Z" level=info msg="Forcibly stopping sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\"" May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.756 [WARNING][4640] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0", GenerateName:"calico-apiserver-54db556d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2f25b9-87c8-4042-8686-41ddfa8c069c", ResourceVersion:"961", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54db556d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50", Pod:"calico-apiserver-54db556d75-r6c6b", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali499fdb27843", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.756 [INFO][4640] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.756 [INFO][4640] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" iface="eth0" netns="" May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.756 [INFO][4640] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.756 [INFO][4640] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.780 [INFO][4648] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.780 [INFO][4648] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.780 [INFO][4648] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.785 [WARNING][4648] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.785 [INFO][4648] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" HandleID="k8s-pod-network.cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" Workload="localhost-k8s-calico--apiserver--54db556d75--r6c6b-eth0" May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.786 [INFO][4648] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.792665 env[1206]: 2025-05-15 10:48:44.788 [INFO][4640] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc" May 15 10:48:44.793150 env[1206]: time="2025-05-15T10:48:44.792688401Z" level=info msg="TearDown network for sandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\" successfully" May 15 10:48:44.796052 env[1206]: time="2025-05-15T10:48:44.796018466Z" level=info msg="RemovePodSandbox \"cbce02a99ee647930cae9e342d4de2a1694b2b9e6a459476b852817eb6c1eacc\" returns successfully" May 15 10:48:44.796625 env[1206]: time="2025-05-15T10:48:44.796582357Z" level=info msg="StopPodSandbox for \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\"" May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.824 [WARNING][4671] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0", GenerateName:"calico-kube-controllers-6cdd7cd95d-", Namespace:"calico-system", SelfLink:"", UID:"c3a870f1-7b6e-437a-99e2-7212954e3584", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdd7cd95d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045", Pod:"calico-kube-controllers-6cdd7cd95d-nhh2l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5c536501178", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.824 [INFO][4671] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.824 [INFO][4671] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" iface="eth0" netns="" May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.824 [INFO][4671] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.824 [INFO][4671] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.842 [INFO][4679] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.842 [INFO][4679] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.842 [INFO][4679] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.847 [WARNING][4679] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.847 [INFO][4679] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.849 [INFO][4679] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.852705 env[1206]: 2025-05-15 10:48:44.851 [INFO][4671] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:44.852705 env[1206]: time="2025-05-15T10:48:44.852669780Z" level=info msg="TearDown network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\" successfully" May 15 10:48:44.852705 env[1206]: time="2025-05-15T10:48:44.852701153Z" level=info msg="StopPodSandbox for \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\" returns successfully" May 15 10:48:44.853254 env[1206]: time="2025-05-15T10:48:44.853058021Z" level=info msg="RemovePodSandbox for \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\"" May 15 10:48:44.853254 env[1206]: time="2025-05-15T10:48:44.853079775Z" level=info msg="Forcibly stopping sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\"" May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.888 [WARNING][4703] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0", GenerateName:"calico-kube-controllers-6cdd7cd95d-", Namespace:"calico-system", SelfLink:"", UID:"c3a870f1-7b6e-437a-99e2-7212954e3584", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6cdd7cd95d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"74bf8bfa31d4616384891f9f8273169b1cdfa6cfadc79416fc9099c47d391045", Pod:"calico-kube-controllers-6cdd7cd95d-nhh2l", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5c536501178", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.888 [INFO][4703] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.888 [INFO][4703] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" iface="eth0" netns="" May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.889 [INFO][4703] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.889 [INFO][4703] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.917 [INFO][4712] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.917 [INFO][4712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.917 [INFO][4712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.923 [WARNING][4712] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.923 [INFO][4712] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" HandleID="k8s-pod-network.1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" Workload="localhost-k8s-calico--kube--controllers--6cdd7cd95d--nhh2l-eth0" May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.924 [INFO][4712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.929489 env[1206]: 2025-05-15 10:48:44.927 [INFO][4703] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48" May 15 10:48:44.929973 env[1206]: time="2025-05-15T10:48:44.929513409Z" level=info msg="TearDown network for sandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\" successfully" May 15 10:48:44.932907 env[1206]: time="2025-05-15T10:48:44.932823244Z" level=info msg="RemovePodSandbox \"1f85bf421f47b064b95f47fffd604ebc0ad5d3b99b0c01e01af4b6f6cf730e48\" returns successfully" May 15 10:48:44.933575 env[1206]: time="2025-05-15T10:48:44.933533666Z" level=info msg="StopPodSandbox for \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\"" May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.973 [WARNING][4736] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0", GenerateName:"calico-apiserver-54db556d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"fd98c940-6651-401b-85a6-d522ed01b648", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54db556d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9", Pod:"calico-apiserver-54db556d75-hzxpv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid55daaf7573", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.973 [INFO][4736] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.973 [INFO][4736] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" iface="eth0" netns="" May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.973 [INFO][4736] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.973 [INFO][4736] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.990 [INFO][4744] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.990 [INFO][4744] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.990 [INFO][4744] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.995 [WARNING][4744] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.995 [INFO][4744] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.996 [INFO][4744] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:44.999682 env[1206]: 2025-05-15 10:48:44.997 [INFO][4736] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:45.000149 env[1206]: time="2025-05-15T10:48:44.999705133Z" level=info msg="TearDown network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\" successfully" May 15 10:48:45.000149 env[1206]: time="2025-05-15T10:48:44.999733739Z" level=info msg="StopPodSandbox for \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\" returns successfully" May 15 10:48:45.000348 env[1206]: time="2025-05-15T10:48:45.000319413Z" level=info msg="RemovePodSandbox for \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\"" May 15 10:48:45.000426 env[1206]: time="2025-05-15T10:48:45.000356917Z" level=info msg="Forcibly stopping sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\"" May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.033 [WARNING][4767] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0", GenerateName:"calico-apiserver-54db556d75-", Namespace:"calico-apiserver", SelfLink:"", UID:"fd98c940-6651-401b-85a6-d522ed01b648", ResourceVersion:"918", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 48, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"54db556d75", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9", Pod:"calico-apiserver-54db556d75-hzxpv", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calid55daaf7573", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.033 [INFO][4767] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.033 [INFO][4767] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" iface="eth0" netns="" May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.033 [INFO][4767] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.033 [INFO][4767] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.053 [INFO][4776] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.053 [INFO][4776] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.053 [INFO][4776] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.059 [WARNING][4776] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.059 [INFO][4776] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" HandleID="k8s-pod-network.a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" Workload="localhost-k8s-calico--apiserver--54db556d75--hzxpv-eth0" May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.060 [INFO][4776] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:48:45.063983 env[1206]: 2025-05-15 10:48:45.062 [INFO][4767] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7" May 15 10:48:45.064416 env[1206]: time="2025-05-15T10:48:45.064017706Z" level=info msg="TearDown network for sandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\" successfully" May 15 10:48:45.067487 env[1206]: time="2025-05-15T10:48:45.067461925Z" level=info msg="RemovePodSandbox \"a34e9076946985ecc43cf47e8982fc6d12a5a6c94ba36d46185ae3f44b9f28e7\" returns successfully" May 15 10:48:46.379853 env[1206]: time="2025-05-15T10:48:46.379797637Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:46.382362 env[1206]: time="2025-05-15T10:48:46.382331194Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:46.385607 env[1206]: time="2025-05-15T10:48:46.385576213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:46.387868 env[1206]: time="2025-05-15T10:48:46.387844255Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:46.388359 env[1206]: time="2025-05-15T10:48:46.388335880Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:48:46.389297 env[1206]: time="2025-05-15T10:48:46.389269634Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:48:46.390422 env[1206]: time="2025-05-15T10:48:46.390382672Z" level=info msg="CreateContainer within sandbox \"b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:48:46.407010 env[1206]: time="2025-05-15T10:48:46.406978988Z" level=info msg="CreateContainer within sandbox \"b8c2055d8ae5f34be576fb133d447554caed0ec323b3dfcd0e5f64f0bbac70a9\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"ebdcd79a3b4867f2bd08c7ab08542b3062be9d16520330dc90ad4379f7f37b6b\"" May 15 10:48:46.407319 env[1206]: time="2025-05-15T10:48:46.407299923Z" level=info msg="StartContainer for \"ebdcd79a3b4867f2bd08c7ab08542b3062be9d16520330dc90ad4379f7f37b6b\"" May 15 10:48:46.422497 systemd[1]: Started cri-containerd-ebdcd79a3b4867f2bd08c7ab08542b3062be9d16520330dc90ad4379f7f37b6b.scope. May 15 10:48:46.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.433000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.433000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit: BPF prog-id=189 op=LOAD May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3715 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646364373961336234383637663262643038633761623038353432 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3715 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646364373961336234383637663262643038633761623038353432 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit: BPF prog-id=190 op=LOAD May 15 10:48:46.434000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000298d00 items=0 ppid=3715 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646364373961336234383637663262643038633761623038353432 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.434000 audit: BPF prog-id=191 op=LOAD May 15 10:48:46.434000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000298d48 items=0 ppid=3715 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.434000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646364373961336234383637663262643038633761623038353432 May 15 10:48:46.434000 audit: BPF prog-id=191 op=UNLOAD May 15 10:48:46.435000 audit: BPF prog-id=190 op=UNLOAD May 15 10:48:46.435000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.435000 audit: BPF prog-id=192 op=LOAD May 15 10:48:46.435000 audit[4790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000299158 items=0 ppid=3715 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.435000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562646364373961336234383637663262643038633761623038353432 May 15 10:48:46.461062 env[1206]: time="2025-05-15T10:48:46.461015502Z" level=info msg="StartContainer for \"ebdcd79a3b4867f2bd08c7ab08542b3062be9d16520330dc90ad4379f7f37b6b\" returns successfully" May 15 10:48:46.474749 kubelet[1952]: I0515 10:48:46.473784 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-54db556d75-hzxpv" podStartSLOduration=26.904916498 podStartE2EDuration="34.473760002s" podCreationTimestamp="2025-05-15 10:48:12 +0000 UTC" firstStartedPulling="2025-05-15 10:48:38.820327644 +0000 UTC m=+54.629963028" lastFinishedPulling="2025-05-15 10:48:46.389171148 +0000 UTC m=+62.198806532" observedRunningTime="2025-05-15 10:48:46.473749541 +0000 UTC m=+62.283384925" watchObservedRunningTime="2025-05-15 10:48:46.473760002 +0000 UTC m=+62.283395386" May 15 10:48:46.481000 audit[4820]: NETFILTER_CFG table=filter:107 family=2 entries=10 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:46.481000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff8789f420 a2=0 a3=7fff8789f40c items=0 ppid=2098 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.481000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:46.494000 audit[4820]: NETFILTER_CFG table=nat:108 family=2 entries=20 op=nft_register_rule pid=4820 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:46.494000 audit[4820]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff8789f420 a2=0 a3=7fff8789f40c items=0 ppid=2098 pid=4820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.494000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:46.767932 env[1206]: time="2025-05-15T10:48:46.767879635Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:46.770617 env[1206]: time="2025-05-15T10:48:46.770572529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:46.772512 env[1206]: time="2025-05-15T10:48:46.772484192Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:46.773844 env[1206]: time="2025-05-15T10:48:46.773805705Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:46.774317 env[1206]: time="2025-05-15T10:48:46.774282601Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:48:46.775169 env[1206]: time="2025-05-15T10:48:46.775150804Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:48:46.776154 env[1206]: time="2025-05-15T10:48:46.776133725Z" level=info msg="CreateContainer within sandbox \"be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:48:46.787279 env[1206]: time="2025-05-15T10:48:46.787247690Z" level=info msg="CreateContainer within sandbox \"be587689013588b2086e055bc844de526365ad98563a2e8ddd61bccd881c9a50\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"94cace54083db73749e4cbb181271a93832f8ac682980e6f866c078f6857db51\"" May 15 10:48:46.787782 env[1206]: time="2025-05-15T10:48:46.787747663Z" level=info msg="StartContainer for \"94cace54083db73749e4cbb181271a93832f8ac682980e6f866c078f6857db51\"" May 15 10:48:46.800478 systemd[1]: Started cri-containerd-94cace54083db73749e4cbb181271a93832f8ac682980e6f866c078f6857db51.scope. May 15 10:48:46.817247 kernel: kauditd_printk_skb: 327 callbacks suppressed May 15 10:48:46.817634 kernel: audit: type=1400 audit(1747306126.812:1362): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.817667 kernel: audit: type=1400 audit(1747306126.812:1363): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.824841 kernel: audit: type=1400 audit(1747306126.812:1364): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.824917 kernel: audit: type=1400 audit(1747306126.812:1365): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.829537 kernel: audit: type=1400 audit(1747306126.812:1366): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.832890 kernel: audit: type=1400 audit(1747306126.812:1367): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.839908 kernel: audit: type=1400 audit(1747306126.812:1368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.839958 kernel: audit: type=1400 audit(1747306126.812:1369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.843076 kernel: audit: type=1400 audit(1747306126.812:1370): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.812000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.846222 kernel: audit: type=1400 audit(1747306126.813:1371): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.813000 audit: BPF prog-id=193 op=LOAD May 15 10:48:46.817000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.817000 audit[4839]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4077 pid=4839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636163653534303833646237333734396534636262313831323731 May 15 10:48:46.817000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.817000 audit[4839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4077 pid=4839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.817000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636163653534303833646237333734396534636262313831323731 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit: BPF prog-id=194 op=LOAD May 15 10:48:46.822000 audit[4839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002efdc0 items=0 ppid=4077 pid=4839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636163653534303833646237333734396534636262313831323731 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.822000 audit: BPF prog-id=195 op=LOAD May 15 10:48:46.822000 audit[4839]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002efe08 items=0 ppid=4077 pid=4839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636163653534303833646237333734396534636262313831323731 May 15 10:48:46.822000 audit: BPF prog-id=195 op=UNLOAD May 15 10:48:46.822000 audit: BPF prog-id=194 op=UNLOAD May 15 10:48:46.823000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { perfmon } for pid=4839 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit[4839]: AVC avc: denied { bpf } for pid=4839 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:46.823000 audit: BPF prog-id=196 op=LOAD May 15 10:48:46.823000 audit[4839]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003ce218 items=0 ppid=4077 pid=4839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:46.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934636163653534303833646237333734396534636262313831323731 May 15 10:48:46.897418 env[1206]: time="2025-05-15T10:48:46.897373482Z" level=info msg="StartContainer for \"94cace54083db73749e4cbb181271a93832f8ac682980e6f866c078f6857db51\" returns successfully" May 15 10:48:47.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.140:22-10.0.0.1:59026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:47.167003 systemd[1]: Started sshd@16-10.0.0.140:22-10.0.0.1:59026.service. May 15 10:48:47.204833 sshd[4871]: Accepted publickey for core from 10.0.0.1 port 59026 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:47.204000 audit[4871]: USER_ACCT pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.205000 audit[4871]: CRED_ACQ pid=4871 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.205000 audit[4871]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd8defcef0 a2=3 a3=0 items=0 ppid=1 pid=4871 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:47.205000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:47.206758 sshd[4871]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:47.210968 systemd[1]: Started session-17.scope. May 15 10:48:47.211313 systemd-logind[1196]: New session 17 of user core. May 15 10:48:47.215000 audit[4871]: USER_START pid=4871 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.216000 audit[4873]: CRED_ACQ pid=4873 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.218000 audit[4801]: AVC avc: denied { watch } for pid=4801 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_48_25.2485246899/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c373,c823 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c373,c823 tclass=file permissive=0 May 15 10:48:47.218000 audit[4801]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0014a3a60 a2=fc6 a3=0 items=0 ppid=3715 pid=4801 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c373,c823 key=(null) May 15 10:48:47.218000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:48:47.346850 sshd[4871]: pam_unix(sshd:session): session closed for user core May 15 10:48:47.348000 audit[4871]: USER_END pid=4871 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.348000 audit[4871]: CRED_DISP pid=4871 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.350619 systemd[1]: sshd@16-10.0.0.140:22-10.0.0.1:59026.service: Deactivated successfully. May 15 10:48:47.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.140:22-10.0.0.1:59026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:47.351501 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:48:47.352143 systemd-logind[1196]: Session 17 logged out. Waiting for processes to exit. May 15 10:48:47.353876 systemd[1]: Started sshd@17-10.0.0.140:22-10.0.0.1:59036.service. May 15 10:48:47.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.140:22-10.0.0.1:59036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:47.355259 systemd-logind[1196]: Removed session 17. May 15 10:48:47.382000 audit[4884]: USER_ACCT pid=4884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.383364 sshd[4884]: Accepted publickey for core from 10.0.0.1 port 59036 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:47.383000 audit[4884]: CRED_ACQ pid=4884 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.383000 audit[4884]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6c29f4c0 a2=3 a3=0 items=0 ppid=1 pid=4884 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:47.383000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:47.384561 sshd[4884]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:47.388718 systemd[1]: Started session-18.scope. May 15 10:48:47.388846 systemd-logind[1196]: New session 18 of user core. May 15 10:48:47.393000 audit[4884]: USER_START pid=4884 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.394000 audit[4886]: CRED_ACQ pid=4886 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.495287 kubelet[1952]: I0515 10:48:47.495170 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-54db556d75-r6c6b" podStartSLOduration=29.070992547 podStartE2EDuration="35.49515297s" podCreationTimestamp="2025-05-15 10:48:12 +0000 UTC" firstStartedPulling="2025-05-15 10:48:40.350862618 +0000 UTC m=+56.160498002" lastFinishedPulling="2025-05-15 10:48:46.775023041 +0000 UTC m=+62.584658425" observedRunningTime="2025-05-15 10:48:47.487139916 +0000 UTC m=+63.296775300" watchObservedRunningTime="2025-05-15 10:48:47.49515297 +0000 UTC m=+63.304788354" May 15 10:48:47.504000 audit[4894]: NETFILTER_CFG table=filter:109 family=2 entries=10 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:47.504000 audit[4894]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffe1e64be70 a2=0 a3=7ffe1e64be5c items=0 ppid=2098 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:47.504000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:47.508000 audit[4894]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:47.508000 audit[4894]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe1e64be70 a2=0 a3=7ffe1e64be5c items=0 ppid=2098 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:47.508000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:47.525000 audit[4896]: NETFILTER_CFG table=filter:111 family=2 entries=9 op=nft_register_rule pid=4896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:47.525000 audit[4896]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffdd0a49860 a2=0 a3=7ffdd0a4984c items=0 ppid=2098 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:47.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:47.529000 audit[4896]: NETFILTER_CFG table=nat:112 family=2 entries=27 op=nft_register_chain pid=4896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:47.529000 audit[4896]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdd0a49860 a2=0 a3=7ffdd0a4984c items=0 ppid=2098 pid=4896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:47.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:47.593652 sshd[4884]: pam_unix(sshd:session): session closed for user core May 15 10:48:47.597297 systemd[1]: Started sshd@18-10.0.0.140:22-10.0.0.1:59050.service. May 15 10:48:47.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.140:22-10.0.0.1:59050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:47.597000 audit[4884]: USER_END pid=4884 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.597000 audit[4884]: CRED_DISP pid=4884 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.140:22-10.0.0.1:59036 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:47.599461 systemd[1]: sshd@17-10.0.0.140:22-10.0.0.1:59036.service: Deactivated successfully. May 15 10:48:47.600243 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:48:47.600788 systemd-logind[1196]: Session 18 logged out. Waiting for processes to exit. May 15 10:48:47.601607 systemd-logind[1196]: Removed session 18. May 15 10:48:47.630000 audit[4899]: USER_ACCT pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.630832 sshd[4899]: Accepted publickey for core from 10.0.0.1 port 59050 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:47.631000 audit[4899]: CRED_ACQ pid=4899 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.631000 audit[4899]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd734ce4a0 a2=3 a3=0 items=0 ppid=1 pid=4899 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:47.631000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:47.632001 sshd[4899]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:47.635526 systemd-logind[1196]: New session 19 of user core. May 15 10:48:47.635809 systemd[1]: Started session-19.scope. May 15 10:48:47.638000 audit[4899]: USER_START pid=4899 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.639000 audit[4902]: CRED_ACQ pid=4902 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:47.723000 audit[4850]: AVC avc: denied { watch } for pid=4850 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_48_25.2818083863/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c242,c891 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c242,c891 tclass=file permissive=0 May 15 10:48:47.723000 audit[4850]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f40380 a2=fc6 a3=0 items=0 ppid=4077 pid=4850 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c242,c891 key=(null) May 15 10:48:47.723000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:48:48.468800 kubelet[1952]: I0515 10:48:48.468762 1952 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:48:49.643000 audit[4915]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:49.643000 audit[4915]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffd81d9200 a2=0 a3=7fffd81d91ec items=0 ppid=2098 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:49.648000 audit[4915]: NETFILTER_CFG table=nat:114 family=2 entries=22 op=nft_register_rule pid=4915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:49.648000 audit[4915]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd81d9200 a2=0 a3=0 items=0 ppid=2098 pid=4915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.648000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:49.660024 sshd[4899]: pam_unix(sshd:session): session closed for user core May 15 10:48:49.662786 systemd[1]: sshd@18-10.0.0.140:22-10.0.0.1:59050.service: Deactivated successfully. May 15 10:48:49.659000 audit[4899]: USER_END pid=4899 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:49.659000 audit[4899]: CRED_DISP pid=4899 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:49.661000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.140:22-10.0.0.1:59050 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:49.663302 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:48:49.664682 systemd-logind[1196]: Session 19 logged out. Waiting for processes to exit. May 15 10:48:49.664000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.140:22-10.0.0.1:58934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:49.665671 systemd[1]: Started sshd@19-10.0.0.140:22-10.0.0.1:58934.service. May 15 10:48:49.667113 systemd-logind[1196]: Removed session 19. May 15 10:48:49.672000 audit[4920]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:49.672000 audit[4920]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7fffd9782010 a2=0 a3=7fffd9781ffc items=0 ppid=2098 pid=4920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.672000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:49.680000 audit[4920]: NETFILTER_CFG table=nat:116 family=2 entries=22 op=nft_register_rule pid=4920 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:49.680000 audit[4920]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7fffd9782010 a2=0 a3=0 items=0 ppid=2098 pid=4920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.680000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:49.699000 audit[4919]: USER_ACCT pid=4919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:49.700688 sshd[4919]: Accepted publickey for core from 10.0.0.1 port 58934 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:49.700000 audit[4919]: CRED_ACQ pid=4919 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:49.700000 audit[4919]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddd610550 a2=3 a3=0 items=0 ppid=1 pid=4919 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.700000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:49.701803 sshd[4919]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:49.705525 systemd-logind[1196]: New session 20 of user core. May 15 10:48:49.705994 systemd[1]: Started session-20.scope. May 15 10:48:49.708000 audit[4919]: USER_START pid=4919 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:49.709000 audit[4923]: CRED_ACQ pid=4923 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:49.857468 env[1206]: time="2025-05-15T10:48:49.857401383Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:49.859407 env[1206]: time="2025-05-15T10:48:49.859365636Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:49.861063 env[1206]: time="2025-05-15T10:48:49.861034924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:49.862506 env[1206]: time="2025-05-15T10:48:49.862474637Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:48:49.862955 env[1206]: time="2025-05-15T10:48:49.862919830Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 10:48:49.865489 env[1206]: time="2025-05-15T10:48:49.865412970Z" level=info msg="CreateContainer within sandbox \"6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:48:49.875000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:49.875000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0007d8b60 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:48:49.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:48:49.875000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:49.875000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000619ce0 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:48:49.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:48:49.876000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:49.876000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000619d00 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:48:49.876000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:48:49.876000 audit[1792]: AVC avc: denied { watch } for pid=1792 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:48:49.876000 audit[1792]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000619d20 a2=fc6 a3=0 items=0 ppid=1645 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c332,c1020 key=(null) May 15 10:48:49.876000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:48:49.880036 env[1206]: time="2025-05-15T10:48:49.879924940Z" level=info msg="CreateContainer within sandbox \"6248abe50b2b5212719e2afac4cdf9e18968fa7be9019a664bd4e6782bf2fac1\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"446b66877a629e9ce71e8539d196ec9a528d3a2b3b05ad48b76286f87d8742c6\"" May 15 10:48:49.880631 env[1206]: time="2025-05-15T10:48:49.880609977Z" level=info msg="StartContainer for \"446b66877a629e9ce71e8539d196ec9a528d3a2b3b05ad48b76286f87d8742c6\"" May 15 10:48:49.902641 systemd[1]: run-containerd-runc-k8s.io-446b66877a629e9ce71e8539d196ec9a528d3a2b3b05ad48b76286f87d8742c6-runc.HB2gCT.mount: Deactivated successfully. May 15 10:48:49.915089 systemd[1]: Started cri-containerd-446b66877a629e9ce71e8539d196ec9a528d3a2b3b05ad48b76286f87d8742c6.scope. May 15 10:48:49.926000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7f5ea167c728 items=0 ppid=3530 pid=4939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366236363837376136323965396365373165383533396431393665 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.926000 audit: BPF prog-id=197 op=LOAD May 15 10:48:49.926000 audit[4939]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c0003ce258 items=0 ppid=3530 pid=4939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.926000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366236363837376136323965396365373165383533396431393665 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit: BPF prog-id=198 op=LOAD May 15 10:48:49.927000 audit[4939]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c0003ce2a8 items=0 ppid=3530 pid=4939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366236363837376136323965396365373165383533396431393665 May 15 10:48:49.927000 audit: BPF prog-id=198 op=UNLOAD May 15 10:48:49.927000 audit: BPF prog-id=197 op=UNLOAD May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { perfmon } for pid=4939 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit[4939]: AVC avc: denied { bpf } for pid=4939 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:48:49.927000 audit: BPF prog-id=199 op=LOAD May 15 10:48:49.927000 audit[4939]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c0003ce338 items=0 ppid=3530 pid=4939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:49.927000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3434366236363837376136323965396365373165383533396431393665 May 15 10:48:49.990552 env[1206]: time="2025-05-15T10:48:49.990483990Z" level=info msg="StartContainer for \"446b66877a629e9ce71e8539d196ec9a528d3a2b3b05ad48b76286f87d8742c6\" returns successfully" May 15 10:48:50.126794 sshd[4919]: pam_unix(sshd:session): session closed for user core May 15 10:48:50.127000 audit[4919]: USER_END pid=4919 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:50.128000 audit[4919]: CRED_DISP pid=4919 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:50.131667 systemd[1]: Started sshd@20-10.0.0.140:22-10.0.0.1:58938.service. May 15 10:48:50.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.140:22-10.0.0.1:58938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:50.132244 systemd[1]: sshd@19-10.0.0.140:22-10.0.0.1:58934.service: Deactivated successfully. May 15 10:48:50.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.140:22-10.0.0.1:58934 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:50.132887 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:48:50.133497 systemd-logind[1196]: Session 20 logged out. Waiting for processes to exit. May 15 10:48:50.134357 systemd-logind[1196]: Removed session 20. May 15 10:48:50.165000 audit[4973]: USER_ACCT pid=4973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:50.167482 sshd[4973]: Accepted publickey for core from 10.0.0.1 port 58938 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:50.166000 audit[4973]: CRED_ACQ pid=4973 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:50.166000 audit[4973]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee5692ae0 a2=3 a3=0 items=0 ppid=1 pid=4973 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:50.166000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:50.168608 sshd[4973]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:50.172265 systemd-logind[1196]: New session 21 of user core. May 15 10:48:50.173051 systemd[1]: Started session-21.scope. May 15 10:48:50.176000 audit[4973]: USER_START pid=4973 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:50.177000 audit[4976]: CRED_ACQ pid=4976 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:50.277041 sshd[4973]: pam_unix(sshd:session): session closed for user core May 15 10:48:50.276000 audit[4973]: USER_END pid=4973 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:50.276000 audit[4973]: CRED_DISP pid=4973 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:50.279056 systemd[1]: sshd@20-10.0.0.140:22-10.0.0.1:58938.service: Deactivated successfully. May 15 10:48:50.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.140:22-10.0.0.1:58938 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:50.279745 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:48:50.280379 systemd-logind[1196]: Session 21 logged out. Waiting for processes to exit. May 15 10:48:50.281099 systemd-logind[1196]: Removed session 21. May 15 10:48:50.353759 kubelet[1952]: I0515 10:48:50.353722 1952 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:48:50.353759 kubelet[1952]: I0515 10:48:50.353755 1952 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:48:50.483920 kubelet[1952]: I0515 10:48:50.483768 1952 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-gv8kc" podStartSLOduration=26.788032957 podStartE2EDuration="38.483743051s" podCreationTimestamp="2025-05-15 10:48:12 +0000 UTC" firstStartedPulling="2025-05-15 10:48:38.168466546 +0000 UTC m=+53.978101930" lastFinishedPulling="2025-05-15 10:48:49.86417664 +0000 UTC m=+65.673812024" observedRunningTime="2025-05-15 10:48:50.483056269 +0000 UTC m=+66.292691653" watchObservedRunningTime="2025-05-15 10:48:50.483743051 +0000 UTC m=+66.293378435" May 15 10:48:55.280979 systemd[1]: Started sshd@21-10.0.0.140:22-10.0.0.1:58946.service. May 15 10:48:55.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.140:22-10.0.0.1:58946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:55.282651 kernel: kauditd_printk_skb: 187 callbacks suppressed May 15 10:48:55.282716 kernel: audit: type=1130 audit(1747306135.280:1445): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.140:22-10.0.0.1:58946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:55.312000 audit[5017]: USER_ACCT pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.313146 sshd[5017]: Accepted publickey for core from 10.0.0.1 port 58946 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:48:55.316000 audit[5017]: CRED_ACQ pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.317355 sshd[5017]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:48:55.323297 kernel: audit: type=1101 audit(1747306135.312:1446): pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.323378 kernel: audit: type=1103 audit(1747306135.316:1447): pid=5017 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.323406 kernel: audit: type=1006 audit(1747306135.316:1448): pid=5017 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 May 15 10:48:55.323427 kernel: audit: type=1300 audit(1747306135.316:1448): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3afddd60 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:55.316000 audit[5017]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff3afddd60 a2=3 a3=0 items=0 ppid=1 pid=5017 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:55.321137 systemd-logind[1196]: New session 22 of user core. May 15 10:48:55.321675 systemd[1]: Started session-22.scope. May 15 10:48:55.328523 kernel: audit: type=1327 audit(1747306135.316:1448): proctitle=737368643A20636F7265205B707269765D May 15 10:48:55.316000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:48:55.329000 audit[5017]: USER_START pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.331034 kernel: audit: type=1105 audit(1747306135.329:1449): pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.330000 audit[5020]: CRED_ACQ pid=5020 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.338012 kernel: audit: type=1103 audit(1747306135.330:1450): pid=5020 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.338073 kernel: audit: type=1325 audit(1747306135.334:1451): table=filter:117 family=2 entries=20 op=nft_register_rule pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:55.334000 audit[5021]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:55.334000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffce7ee9370 a2=0 a3=7ffce7ee935c items=0 ppid=2098 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:55.344883 kernel: audit: type=1300 audit(1747306135.334:1451): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffce7ee9370 a2=0 a3=7ffce7ee935c items=0 ppid=2098 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:55.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:55.341000 audit[5021]: NETFILTER_CFG table=nat:118 family=2 entries=106 op=nft_register_chain pid=5021 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:48:55.341000 audit[5021]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7ffce7ee9370 a2=0 a3=7ffce7ee935c items=0 ppid=2098 pid=5021 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:48:55.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:48:55.425241 sshd[5017]: pam_unix(sshd:session): session closed for user core May 15 10:48:55.425000 audit[5017]: USER_END pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.425000 audit[5017]: CRED_DISP pid=5017 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:48:55.427101 systemd[1]: sshd@21-10.0.0.140:22-10.0.0.1:58946.service: Deactivated successfully. May 15 10:48:55.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.140:22-10.0.0.1:58946 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:48:55.427744 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:48:55.428194 systemd-logind[1196]: Session 22 logged out. Waiting for processes to exit. May 15 10:48:55.428778 systemd-logind[1196]: Removed session 22. May 15 10:48:56.297971 kubelet[1952]: E0515 10:48:56.297934 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:48:57.297933 kubelet[1952]: E0515 10:48:57.297889 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:49:00.429959 systemd[1]: Started sshd@22-10.0.0.140:22-10.0.0.1:44270.service. May 15 10:49:00.432473 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 10:49:00.432525 kernel: audit: type=1130 audit(1747306140.429:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.140:22-10.0.0.1:44270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:49:00.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.140:22-10.0.0.1:44270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:49:00.460000 audit[5034]: USER_ACCT pid=5034 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.460841 sshd[5034]: Accepted publickey for core from 10.0.0.1 port 44270 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:49:00.464000 audit[5034]: CRED_ACQ pid=5034 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.464955 sshd[5034]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:49:00.468393 kernel: audit: type=1101 audit(1747306140.460:1457): pid=5034 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.468473 kernel: audit: type=1103 audit(1747306140.464:1458): pid=5034 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.468498 kernel: audit: type=1006 audit(1747306140.464:1459): pid=5034 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 10:49:00.468109 systemd-logind[1196]: New session 23 of user core. May 15 10:49:00.468818 systemd[1]: Started session-23.scope. May 15 10:49:00.464000 audit[5034]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3412d9d0 a2=3 a3=0 items=0 ppid=1 pid=5034 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:49:00.474493 kernel: audit: type=1300 audit(1747306140.464:1459): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe3412d9d0 a2=3 a3=0 items=0 ppid=1 pid=5034 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:49:00.474592 kernel: audit: type=1327 audit(1747306140.464:1459): proctitle=737368643A20636F7265205B707269765D May 15 10:49:00.464000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:49:00.472000 audit[5034]: USER_START pid=5034 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.480024 kernel: audit: type=1105 audit(1747306140.472:1460): pid=5034 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.480064 kernel: audit: type=1103 audit(1747306140.473:1461): pid=5036 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.473000 audit[5036]: CRED_ACQ pid=5036 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.578110 sshd[5034]: pam_unix(sshd:session): session closed for user core May 15 10:49:00.578000 audit[5034]: USER_END pid=5034 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.580568 systemd[1]: sshd@22-10.0.0.140:22-10.0.0.1:44270.service: Deactivated successfully. May 15 10:49:00.581249 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:49:00.581984 systemd-logind[1196]: Session 23 logged out. Waiting for processes to exit. May 15 10:49:00.582644 systemd-logind[1196]: Removed session 23. May 15 10:49:00.578000 audit[5034]: CRED_DISP pid=5034 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.586779 kernel: audit: type=1106 audit(1747306140.578:1462): pid=5034 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.586830 kernel: audit: type=1104 audit(1747306140.578:1463): pid=5034 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:00.580000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.140:22-10.0.0.1:44270 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:49:05.582261 systemd[1]: Started sshd@23-10.0.0.140:22-10.0.0.1:44286.service. May 15 10:49:05.581000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.140:22-10.0.0.1:44286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:49:05.583456 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:49:05.583494 kernel: audit: type=1130 audit(1747306145.581:1465): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.140:22-10.0.0.1:44286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:49:05.613000 audit[5057]: USER_ACCT pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.614002 sshd[5057]: Accepted publickey for core from 10.0.0.1 port 44286 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:49:05.615821 sshd[5057]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:49:05.615000 audit[5057]: CRED_ACQ pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.618730 systemd-logind[1196]: New session 24 of user core. May 15 10:49:05.619406 systemd[1]: Started session-24.scope. May 15 10:49:05.621359 kernel: audit: type=1101 audit(1747306145.613:1466): pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.621409 kernel: audit: type=1103 audit(1747306145.615:1467): pid=5057 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.621426 kernel: audit: type=1006 audit(1747306145.615:1468): pid=5057 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 10:49:05.615000 audit[5057]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1354f710 a2=3 a3=0 items=0 ppid=1 pid=5057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:49:05.627520 kernel: audit: type=1300 audit(1747306145.615:1468): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1354f710 a2=3 a3=0 items=0 ppid=1 pid=5057 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:49:05.627554 kernel: audit: type=1327 audit(1747306145.615:1468): proctitle=737368643A20636F7265205B707269765D May 15 10:49:05.615000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:49:05.628829 kernel: audit: type=1105 audit(1747306145.622:1469): pid=5057 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.622000 audit[5057]: USER_START pid=5057 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.632988 kernel: audit: type=1103 audit(1747306145.623:1470): pid=5059 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.623000 audit[5059]: CRED_ACQ pid=5059 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.721208 sshd[5057]: pam_unix(sshd:session): session closed for user core May 15 10:49:05.721000 audit[5057]: USER_END pid=5057 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.723550 systemd[1]: sshd@23-10.0.0.140:22-10.0.0.1:44286.service: Deactivated successfully. May 15 10:49:05.724193 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:49:05.724618 systemd-logind[1196]: Session 24 logged out. Waiting for processes to exit. May 15 10:49:05.725164 systemd-logind[1196]: Removed session 24. May 15 10:49:05.721000 audit[5057]: CRED_DISP pid=5057 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.729790 kernel: audit: type=1106 audit(1747306145.721:1471): pid=5057 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.729837 kernel: audit: type=1104 audit(1747306145.721:1472): pid=5057 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:05.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.140:22-10.0.0.1:44286 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:49:06.298118 kubelet[1952]: E0515 10:49:06.298083 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:49:06.680708 kubelet[1952]: E0515 10:49:06.680679 1952 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:49:10.724000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.140:22-10.0.0.1:44310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:49:10.725160 systemd[1]: Started sshd@24-10.0.0.140:22-10.0.0.1:44310.service. May 15 10:49:10.726341 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:49:10.726391 kernel: audit: type=1130 audit(1747306150.724:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.140:22-10.0.0.1:44310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:49:10.765000 audit[5094]: USER_ACCT pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.766047 sshd[5094]: Accepted publickey for core from 10.0.0.1 port 44310 ssh2: RSA SHA256:elUx8pLYJ1wReI27bFwtvLgV0rwP0MVVbSVqDmPk46I May 15 10:49:10.767890 sshd[5094]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:49:10.767000 audit[5094]: CRED_ACQ pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.772235 systemd-logind[1196]: New session 25 of user core. May 15 10:49:10.773021 systemd[1]: Started session-25.scope. May 15 10:49:10.773419 kernel: audit: type=1101 audit(1747306150.765:1475): pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.773495 kernel: audit: type=1103 audit(1747306150.767:1476): pid=5094 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.773520 kernel: audit: type=1006 audit(1747306150.767:1477): pid=5094 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 15 10:49:10.767000 audit[5094]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc58df96f0 a2=3 a3=0 items=0 ppid=1 pid=5094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:49:10.779659 kernel: audit: type=1300 audit(1747306150.767:1477): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc58df96f0 a2=3 a3=0 items=0 ppid=1 pid=5094 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:49:10.779711 kernel: audit: type=1327 audit(1747306150.767:1477): proctitle=737368643A20636F7265205B707269765D May 15 10:49:10.767000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:49:10.777000 audit[5094]: USER_START pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.785525 kernel: audit: type=1105 audit(1747306150.777:1478): pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.785721 kernel: audit: type=1103 audit(1747306150.778:1479): pid=5096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.778000 audit[5096]: CRED_ACQ pid=5096 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.899378 sshd[5094]: pam_unix(sshd:session): session closed for user core May 15 10:49:10.899000 audit[5094]: USER_END pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.901697 systemd[1]: sshd@24-10.0.0.140:22-10.0.0.1:44310.service: Deactivated successfully. May 15 10:49:10.902399 systemd[1]: session-25.scope: Deactivated successfully. May 15 10:49:10.903202 systemd-logind[1196]: Session 25 logged out. Waiting for processes to exit. May 15 10:49:10.903944 systemd-logind[1196]: Removed session 25. May 15 10:49:10.900000 audit[5094]: CRED_DISP pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.908219 kernel: audit: type=1106 audit(1747306150.899:1480): pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.908268 kernel: audit: type=1104 audit(1747306150.900:1481): pid=5094 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:49:10.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.140:22-10.0.0.1:44310 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'