May 15 10:38:28.815905 kernel: Linux version 5.15.182-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu May 15 09:06:41 -00 2025 May 15 10:38:28.815923 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:28.815933 kernel: BIOS-provided physical RAM map: May 15 10:38:28.815938 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 10:38:28.815944 kernel: BIOS-e820: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 10:38:28.815949 kernel: BIOS-e820: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 10:38:28.815955 kernel: BIOS-e820: [mem 0x0000000000808000-0x000000000080afff] usable May 15 10:38:28.815961 kernel: BIOS-e820: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 10:38:28.815967 kernel: BIOS-e820: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 10:38:28.815973 kernel: BIOS-e820: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 10:38:28.815979 kernel: BIOS-e820: [mem 0x0000000000900000-0x000000009c8eefff] usable May 15 10:38:28.815984 kernel: BIOS-e820: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 10:38:28.815990 kernel: BIOS-e820: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 10:38:28.815995 kernel: BIOS-e820: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 10:38:28.816002 kernel: BIOS-e820: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 10:38:28.816010 kernel: BIOS-e820: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 10:38:28.816015 kernel: BIOS-e820: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 10:38:28.816021 kernel: BIOS-e820: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:38:28.816027 kernel: NX (Execute Disable) protection: active May 15 10:38:28.816033 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 10:38:28.816039 kernel: e820: update [mem 0x9b475018-0x9b47ec57] usable ==> usable May 15 10:38:28.816045 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 10:38:28.816050 kernel: e820: update [mem 0x9b438018-0x9b474e57] usable ==> usable May 15 10:38:28.816056 kernel: extended physical RAM map: May 15 10:38:28.816062 kernel: reserve setup_data: [mem 0x0000000000000000-0x000000000009ffff] usable May 15 10:38:28.816069 kernel: reserve setup_data: [mem 0x0000000000100000-0x00000000007fffff] usable May 15 10:38:28.816075 kernel: reserve setup_data: [mem 0x0000000000800000-0x0000000000807fff] ACPI NVS May 15 10:38:28.816081 kernel: reserve setup_data: [mem 0x0000000000808000-0x000000000080afff] usable May 15 10:38:28.816087 kernel: reserve setup_data: [mem 0x000000000080b000-0x000000000080bfff] ACPI NVS May 15 10:38:28.816093 kernel: reserve setup_data: [mem 0x000000000080c000-0x000000000080ffff] usable May 15 10:38:28.816098 kernel: reserve setup_data: [mem 0x0000000000810000-0x00000000008fffff] ACPI NVS May 15 10:38:28.816104 kernel: reserve setup_data: [mem 0x0000000000900000-0x000000009b438017] usable May 15 10:38:28.816110 kernel: reserve setup_data: [mem 0x000000009b438018-0x000000009b474e57] usable May 15 10:38:28.816116 kernel: reserve setup_data: [mem 0x000000009b474e58-0x000000009b475017] usable May 15 10:38:28.816122 kernel: reserve setup_data: [mem 0x000000009b475018-0x000000009b47ec57] usable May 15 10:38:28.816127 kernel: reserve setup_data: [mem 0x000000009b47ec58-0x000000009c8eefff] usable May 15 10:38:28.816135 kernel: reserve setup_data: [mem 0x000000009c8ef000-0x000000009cb6efff] reserved May 15 10:38:28.816141 kernel: reserve setup_data: [mem 0x000000009cb6f000-0x000000009cb7efff] ACPI data May 15 10:38:28.816147 kernel: reserve setup_data: [mem 0x000000009cb7f000-0x000000009cbfefff] ACPI NVS May 15 10:38:28.816153 kernel: reserve setup_data: [mem 0x000000009cbff000-0x000000009cf3ffff] usable May 15 10:38:28.816162 kernel: reserve setup_data: [mem 0x000000009cf40000-0x000000009cf5ffff] reserved May 15 10:38:28.816168 kernel: reserve setup_data: [mem 0x000000009cf60000-0x000000009cffffff] ACPI NVS May 15 10:38:28.816175 kernel: reserve setup_data: [mem 0x00000000b0000000-0x00000000bfffffff] reserved May 15 10:38:28.816182 kernel: efi: EFI v2.70 by EDK II May 15 10:38:28.816188 kernel: efi: SMBIOS=0x9c9ab000 ACPI=0x9cb7e000 ACPI 2.0=0x9cb7e014 MEMATTR=0x9b673018 RNG=0x9cb73018 May 15 10:38:28.816195 kernel: random: crng init done May 15 10:38:28.816201 kernel: SMBIOS 2.8 present. May 15 10:38:28.816207 kernel: DMI: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015 May 15 10:38:28.816214 kernel: Hypervisor detected: KVM May 15 10:38:28.816220 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 May 15 10:38:28.816226 kernel: kvm-clock: cpu 0, msr 6a19a001, primary cpu clock May 15 10:38:28.816233 kernel: kvm-clock: using sched offset of 3994068221 cycles May 15 10:38:28.816242 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns May 15 10:38:28.816248 kernel: tsc: Detected 2794.748 MHz processor May 15 10:38:28.816255 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved May 15 10:38:28.816262 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable May 15 10:38:28.816268 kernel: last_pfn = 0x9cf40 max_arch_pfn = 0x400000000 May 15 10:38:28.816275 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT May 15 10:38:28.816281 kernel: Using GB pages for direct mapping May 15 10:38:28.816288 kernel: Secure boot disabled May 15 10:38:28.816294 kernel: ACPI: Early table checksum verification disabled May 15 10:38:28.816302 kernel: ACPI: RSDP 0x000000009CB7E014 000024 (v02 BOCHS ) May 15 10:38:28.816309 kernel: ACPI: XSDT 0x000000009CB7D0E8 000054 (v01 BOCHS BXPC 00000001 01000013) May 15 10:38:28.816315 kernel: ACPI: FACP 0x000000009CB79000 0000F4 (v03 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:28.816322 kernel: ACPI: DSDT 0x000000009CB7A000 0021A8 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:28.816328 kernel: ACPI: FACS 0x000000009CBDD000 000040 May 15 10:38:28.816335 kernel: ACPI: APIC 0x000000009CB78000 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:28.816341 kernel: ACPI: HPET 0x000000009CB77000 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:28.816348 kernel: ACPI: MCFG 0x000000009CB76000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:28.816354 kernel: ACPI: WAET 0x000000009CB75000 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) May 15 10:38:28.816362 kernel: ACPI: BGRT 0x000000009CB74000 000038 (v01 INTEL EDK2 00000002 01000013) May 15 10:38:28.816369 kernel: ACPI: Reserving FACP table memory at [mem 0x9cb79000-0x9cb790f3] May 15 10:38:28.816375 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cb7a000-0x9cb7c1a7] May 15 10:38:28.816381 kernel: ACPI: Reserving FACS table memory at [mem 0x9cbdd000-0x9cbdd03f] May 15 10:38:28.816388 kernel: ACPI: Reserving APIC table memory at [mem 0x9cb78000-0x9cb7808f] May 15 10:38:28.816394 kernel: ACPI: Reserving HPET table memory at [mem 0x9cb77000-0x9cb77037] May 15 10:38:28.816401 kernel: ACPI: Reserving MCFG table memory at [mem 0x9cb76000-0x9cb7603b] May 15 10:38:28.816407 kernel: ACPI: Reserving WAET table memory at [mem 0x9cb75000-0x9cb75027] May 15 10:38:28.816414 kernel: ACPI: Reserving BGRT table memory at [mem 0x9cb74000-0x9cb74037] May 15 10:38:28.816421 kernel: No NUMA configuration found May 15 10:38:28.816428 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cf3ffff] May 15 10:38:28.816434 kernel: NODE_DATA(0) allocated [mem 0x9cea6000-0x9ceabfff] May 15 10:38:28.816441 kernel: Zone ranges: May 15 10:38:28.816447 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] May 15 10:38:28.816454 kernel: DMA32 [mem 0x0000000001000000-0x000000009cf3ffff] May 15 10:38:28.816460 kernel: Normal empty May 15 10:38:28.816467 kernel: Movable zone start for each node May 15 10:38:28.816473 kernel: Early memory node ranges May 15 10:38:28.816481 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] May 15 10:38:28.816487 kernel: node 0: [mem 0x0000000000100000-0x00000000007fffff] May 15 10:38:28.816494 kernel: node 0: [mem 0x0000000000808000-0x000000000080afff] May 15 10:38:28.816500 kernel: node 0: [mem 0x000000000080c000-0x000000000080ffff] May 15 10:38:28.816507 kernel: node 0: [mem 0x0000000000900000-0x000000009c8eefff] May 15 10:38:28.816513 kernel: node 0: [mem 0x000000009cbff000-0x000000009cf3ffff] May 15 10:38:28.816519 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cf3ffff] May 15 10:38:28.816526 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:38:28.816532 kernel: On node 0, zone DMA: 96 pages in unavailable ranges May 15 10:38:28.816538 kernel: On node 0, zone DMA: 8 pages in unavailable ranges May 15 10:38:28.816546 kernel: On node 0, zone DMA: 1 pages in unavailable ranges May 15 10:38:28.816553 kernel: On node 0, zone DMA: 240 pages in unavailable ranges May 15 10:38:28.816559 kernel: On node 0, zone DMA32: 784 pages in unavailable ranges May 15 10:38:28.816566 kernel: On node 0, zone DMA32: 12480 pages in unavailable ranges May 15 10:38:28.816572 kernel: ACPI: PM-Timer IO Port: 0x608 May 15 10:38:28.816579 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) May 15 10:38:28.816585 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 May 15 10:38:28.816592 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) May 15 10:38:28.816598 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) May 15 10:38:28.816605 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) May 15 10:38:28.816612 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) May 15 10:38:28.816618 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) May 15 10:38:28.816625 kernel: ACPI: Using ACPI (MADT) for SMP configuration information May 15 10:38:28.816631 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 May 15 10:38:28.816638 kernel: TSC deadline timer available May 15 10:38:28.816645 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs May 15 10:38:28.816651 kernel: kvm-guest: KVM setup pv remote TLB flush May 15 10:38:28.816665 kernel: kvm-guest: setup PV sched yield May 15 10:38:28.816673 kernel: [mem 0xc0000000-0xffffffff] available for PCI devices May 15 10:38:28.816681 kernel: Booting paravirtualized kernel on KVM May 15 10:38:28.816692 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns May 15 10:38:28.816700 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 May 15 10:38:28.816707 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 May 15 10:38:28.816714 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 May 15 10:38:28.816721 kernel: pcpu-alloc: [0] 0 1 2 3 May 15 10:38:28.816727 kernel: kvm-guest: setup async PF for cpu 0 May 15 10:38:28.816734 kernel: kvm-guest: stealtime: cpu 0, msr 9b21c0c0 May 15 10:38:28.816741 kernel: kvm-guest: PV spinlocks enabled May 15 10:38:28.816748 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) May 15 10:38:28.816754 kernel: Built 1 zonelists, mobility grouping on. Total pages: 629759 May 15 10:38:28.816763 kernel: Policy zone: DMA32 May 15 10:38:28.816770 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:28.816778 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. May 15 10:38:28.816784 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) May 15 10:38:28.816792 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) May 15 10:38:28.816809 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off May 15 10:38:28.816817 kernel: Memory: 2397432K/2567000K available (12294K kernel code, 2276K rwdata, 13724K rodata, 47472K init, 4108K bss, 169308K reserved, 0K cma-reserved) May 15 10:38:28.816824 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 May 15 10:38:28.816831 kernel: ftrace: allocating 34585 entries in 136 pages May 15 10:38:28.816837 kernel: ftrace: allocated 136 pages with 2 groups May 15 10:38:28.816844 kernel: rcu: Hierarchical RCU implementation. May 15 10:38:28.816851 kernel: rcu: RCU event tracing is enabled. May 15 10:38:28.816858 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. May 15 10:38:28.816866 kernel: Rude variant of Tasks RCU enabled. May 15 10:38:28.816873 kernel: Tracing variant of Tasks RCU enabled. May 15 10:38:28.816880 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. May 15 10:38:28.816887 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 May 15 10:38:28.816894 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 May 15 10:38:28.816901 kernel: Console: colour dummy device 80x25 May 15 10:38:28.816908 kernel: printk: console [ttyS0] enabled May 15 10:38:28.816915 kernel: ACPI: Core revision 20210730 May 15 10:38:28.816922 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns May 15 10:38:28.816930 kernel: APIC: Switch to symmetric I/O mode setup May 15 10:38:28.816936 kernel: x2apic enabled May 15 10:38:28.816943 kernel: Switched APIC routing to physical x2apic. May 15 10:38:28.816950 kernel: kvm-guest: setup PV IPIs May 15 10:38:28.816957 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 May 15 10:38:28.816964 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized May 15 10:38:28.816973 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) May 15 10:38:28.816980 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated May 15 10:38:28.816988 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 May 15 10:38:28.816998 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 May 15 10:38:28.817005 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization May 15 10:38:28.817011 kernel: Spectre V2 : Mitigation: Retpolines May 15 10:38:28.817018 kernel: Spectre V2 : Spectre v2 / SpectreRSB: Filling RSB on context switch and VMEXIT May 15 10:38:28.817025 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls May 15 10:38:28.817032 kernel: RETBleed: Mitigation: untrained return thunk May 15 10:38:28.817039 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier May 15 10:38:28.817046 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp May 15 10:38:28.817053 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' May 15 10:38:28.817061 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' May 15 10:38:28.817068 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' May 15 10:38:28.817075 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 May 15 10:38:28.817082 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. May 15 10:38:28.817089 kernel: Freeing SMP alternatives memory: 32K May 15 10:38:28.817095 kernel: pid_max: default: 32768 minimum: 301 May 15 10:38:28.817102 kernel: LSM: Security Framework initializing May 15 10:38:28.817109 kernel: SELinux: Initializing. May 15 10:38:28.817116 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:38:28.817123 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) May 15 10:38:28.817130 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) May 15 10:38:28.817137 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. May 15 10:38:28.817144 kernel: ... version: 0 May 15 10:38:28.817151 kernel: ... bit width: 48 May 15 10:38:28.817157 kernel: ... generic registers: 6 May 15 10:38:28.817164 kernel: ... value mask: 0000ffffffffffff May 15 10:38:28.817171 kernel: ... max period: 00007fffffffffff May 15 10:38:28.817177 kernel: ... fixed-purpose events: 0 May 15 10:38:28.817185 kernel: ... event mask: 000000000000003f May 15 10:38:28.817192 kernel: signal: max sigframe size: 1776 May 15 10:38:28.817199 kernel: rcu: Hierarchical SRCU implementation. May 15 10:38:28.817205 kernel: smp: Bringing up secondary CPUs ... May 15 10:38:28.817212 kernel: x86: Booting SMP configuration: May 15 10:38:28.817219 kernel: .... node #0, CPUs: #1 May 15 10:38:28.817226 kernel: kvm-clock: cpu 1, msr 6a19a041, secondary cpu clock May 15 10:38:28.817232 kernel: kvm-guest: setup async PF for cpu 1 May 15 10:38:28.817239 kernel: kvm-guest: stealtime: cpu 1, msr 9b29c0c0 May 15 10:38:28.817247 kernel: #2 May 15 10:38:28.817254 kernel: kvm-clock: cpu 2, msr 6a19a081, secondary cpu clock May 15 10:38:28.817261 kernel: kvm-guest: setup async PF for cpu 2 May 15 10:38:28.817267 kernel: kvm-guest: stealtime: cpu 2, msr 9b31c0c0 May 15 10:38:28.817274 kernel: #3 May 15 10:38:28.817281 kernel: kvm-clock: cpu 3, msr 6a19a0c1, secondary cpu clock May 15 10:38:28.817288 kernel: kvm-guest: setup async PF for cpu 3 May 15 10:38:28.817295 kernel: kvm-guest: stealtime: cpu 3, msr 9b39c0c0 May 15 10:38:28.817301 kernel: smp: Brought up 1 node, 4 CPUs May 15 10:38:28.817308 kernel: smpboot: Max logical packages: 1 May 15 10:38:28.817316 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) May 15 10:38:28.817323 kernel: devtmpfs: initialized May 15 10:38:28.817330 kernel: x86/mm: Memory block size: 128MB May 15 10:38:28.817337 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00800000-0x00807fff] (32768 bytes) May 15 10:38:28.817344 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x0080b000-0x0080bfff] (4096 bytes) May 15 10:38:28.817350 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x00810000-0x008fffff] (983040 bytes) May 15 10:38:28.817357 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cb7f000-0x9cbfefff] (524288 bytes) May 15 10:38:28.817364 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x9cf60000-0x9cffffff] (655360 bytes) May 15 10:38:28.817371 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns May 15 10:38:28.817379 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) May 15 10:38:28.817386 kernel: pinctrl core: initialized pinctrl subsystem May 15 10:38:28.817393 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family May 15 10:38:28.817400 kernel: audit: initializing netlink subsys (disabled) May 15 10:38:28.817407 kernel: audit: type=2000 audit(1747305508.252:1): state=initialized audit_enabled=0 res=1 May 15 10:38:28.817414 kernel: thermal_sys: Registered thermal governor 'step_wise' May 15 10:38:28.817420 kernel: thermal_sys: Registered thermal governor 'user_space' May 15 10:38:28.817427 kernel: cpuidle: using governor menu May 15 10:38:28.817434 kernel: ACPI: bus type PCI registered May 15 10:38:28.817442 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 May 15 10:38:28.817449 kernel: dca service started, version 1.12.1 May 15 10:38:28.817456 kernel: PCI: MMCONFIG for domain 0000 [bus 00-ff] at [mem 0xb0000000-0xbfffffff] (base 0xb0000000) May 15 10:38:28.817463 kernel: PCI: MMCONFIG at [mem 0xb0000000-0xbfffffff] reserved in E820 May 15 10:38:28.817470 kernel: PCI: Using configuration type 1 for base access May 15 10:38:28.817476 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. May 15 10:38:28.817483 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages May 15 10:38:28.817490 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages May 15 10:38:28.817497 kernel: ACPI: Added _OSI(Module Device) May 15 10:38:28.817505 kernel: ACPI: Added _OSI(Processor Device) May 15 10:38:28.817511 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) May 15 10:38:28.817518 kernel: ACPI: Added _OSI(Processor Aggregator Device) May 15 10:38:28.817525 kernel: ACPI: Added _OSI(Linux-Dell-Video) May 15 10:38:28.817532 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) May 15 10:38:28.817539 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) May 15 10:38:28.817545 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded May 15 10:38:28.817552 kernel: ACPI: Interpreter enabled May 15 10:38:28.817559 kernel: ACPI: PM: (supports S0 S3 S5) May 15 10:38:28.817566 kernel: ACPI: Using IOAPIC for interrupt routing May 15 10:38:28.817573 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug May 15 10:38:28.817580 kernel: ACPI: Enabled 2 GPEs in block 00 to 3F May 15 10:38:28.817587 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) May 15 10:38:28.817701 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] May 15 10:38:28.817772 kernel: acpi PNP0A08:00: _OSC: platform does not support [PCIeHotplug LTR] May 15 10:38:28.817853 kernel: acpi PNP0A08:00: _OSC: OS now controls [PME AER PCIeCapability] May 15 10:38:28.817865 kernel: PCI host bridge to bus 0000:00 May 15 10:38:28.817940 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] May 15 10:38:28.818003 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] May 15 10:38:28.818062 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] May 15 10:38:28.818123 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xafffffff window] May 15 10:38:28.818182 kernel: pci_bus 0000:00: root bus resource [mem 0xc0000000-0xfebfffff window] May 15 10:38:28.818242 kernel: pci_bus 0000:00: root bus resource [mem 0x800000000-0xfffffffff window] May 15 10:38:28.818304 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] May 15 10:38:28.818384 kernel: pci 0000:00:00.0: [8086:29c0] type 00 class 0x060000 May 15 10:38:28.818459 kernel: pci 0000:00:01.0: [1234:1111] type 00 class 0x030000 May 15 10:38:28.818527 kernel: pci 0000:00:01.0: reg 0x10: [mem 0xc0000000-0xc0ffffff pref] May 15 10:38:28.818594 kernel: pci 0000:00:01.0: reg 0x18: [mem 0xc1044000-0xc1044fff] May 15 10:38:28.818668 kernel: pci 0000:00:01.0: reg 0x30: [mem 0xffff0000-0xffffffff pref] May 15 10:38:28.818737 kernel: pci 0000:00:01.0: BAR 0: assigned to efifb May 15 10:38:28.818827 kernel: pci 0000:00:01.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] May 15 10:38:28.818908 kernel: pci 0000:00:02.0: [1af4:1005] type 00 class 0x00ff00 May 15 10:38:28.818982 kernel: pci 0000:00:02.0: reg 0x10: [io 0x6100-0x611f] May 15 10:38:28.819050 kernel: pci 0000:00:02.0: reg 0x14: [mem 0xc1043000-0xc1043fff] May 15 10:38:28.819118 kernel: pci 0000:00:02.0: reg 0x20: [mem 0x800000000-0x800003fff 64bit pref] May 15 10:38:28.819680 kernel: pci 0000:00:03.0: [1af4:1001] type 00 class 0x010000 May 15 10:38:28.819760 kernel: pci 0000:00:03.0: reg 0x10: [io 0x6000-0x607f] May 15 10:38:28.819846 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xc1042000-0xc1042fff] May 15 10:38:28.819913 kernel: pci 0000:00:03.0: reg 0x20: [mem 0x800004000-0x800007fff 64bit pref] May 15 10:38:28.820921 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 May 15 10:38:28.821030 kernel: pci 0000:00:04.0: reg 0x10: [io 0x60e0-0x60ff] May 15 10:38:28.821101 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xc1041000-0xc1041fff] May 15 10:38:28.821169 kernel: pci 0000:00:04.0: reg 0x20: [mem 0x800008000-0x80000bfff 64bit pref] May 15 10:38:28.821242 kernel: pci 0000:00:04.0: reg 0x30: [mem 0xfffc0000-0xffffffff pref] May 15 10:38:28.821315 kernel: pci 0000:00:1f.0: [8086:2918] type 00 class 0x060100 May 15 10:38:28.821383 kernel: pci 0000:00:1f.0: quirk: [io 0x0600-0x067f] claimed by ICH6 ACPI/GPIO/TCO May 15 10:38:28.821454 kernel: pci 0000:00:1f.2: [8086:2922] type 00 class 0x010601 May 15 10:38:28.821524 kernel: pci 0000:00:1f.2: reg 0x20: [io 0x60c0-0x60df] May 15 10:38:28.821590 kernel: pci 0000:00:1f.2: reg 0x24: [mem 0xc1040000-0xc1040fff] May 15 10:38:28.821672 kernel: pci 0000:00:1f.3: [8086:2930] type 00 class 0x0c0500 May 15 10:38:28.821745 kernel: pci 0000:00:1f.3: reg 0x20: [io 0x6080-0x60bf] May 15 10:38:28.821754 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 May 15 10:38:28.821762 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 May 15 10:38:28.821770 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 May 15 10:38:28.821777 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 May 15 10:38:28.821784 kernel: ACPI: PCI: Interrupt link LNKE configured for IRQ 10 May 15 10:38:28.821792 kernel: ACPI: PCI: Interrupt link LNKF configured for IRQ 10 May 15 10:38:28.821811 kernel: ACPI: PCI: Interrupt link LNKG configured for IRQ 11 May 15 10:38:28.821821 kernel: ACPI: PCI: Interrupt link LNKH configured for IRQ 11 May 15 10:38:28.821828 kernel: ACPI: PCI: Interrupt link GSIA configured for IRQ 16 May 15 10:38:28.821835 kernel: ACPI: PCI: Interrupt link GSIB configured for IRQ 17 May 15 10:38:28.821842 kernel: ACPI: PCI: Interrupt link GSIC configured for IRQ 18 May 15 10:38:28.821850 kernel: ACPI: PCI: Interrupt link GSID configured for IRQ 19 May 15 10:38:28.821857 kernel: ACPI: PCI: Interrupt link GSIE configured for IRQ 20 May 15 10:38:28.821864 kernel: ACPI: PCI: Interrupt link GSIF configured for IRQ 21 May 15 10:38:28.821872 kernel: ACPI: PCI: Interrupt link GSIG configured for IRQ 22 May 15 10:38:28.821879 kernel: ACPI: PCI: Interrupt link GSIH configured for IRQ 23 May 15 10:38:28.821887 kernel: iommu: Default domain type: Translated May 15 10:38:28.821895 kernel: iommu: DMA domain TLB invalidation policy: lazy mode May 15 10:38:28.821968 kernel: pci 0000:00:01.0: vgaarb: setting as boot VGA device May 15 10:38:28.822036 kernel: pci 0000:00:01.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none May 15 10:38:28.822177 kernel: pci 0000:00:01.0: vgaarb: bridge control possible May 15 10:38:28.822200 kernel: vgaarb: loaded May 15 10:38:28.822210 kernel: pps_core: LinuxPPS API ver. 1 registered May 15 10:38:28.822217 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti May 15 10:38:28.822225 kernel: PTP clock support registered May 15 10:38:28.822235 kernel: Registered efivars operations May 15 10:38:28.822242 kernel: PCI: Using ACPI for IRQ routing May 15 10:38:28.822250 kernel: PCI: pci_cache_line_size set to 64 bytes May 15 10:38:28.822256 kernel: e820: reserve RAM buffer [mem 0x0080b000-0x008fffff] May 15 10:38:28.822263 kernel: e820: reserve RAM buffer [mem 0x00810000-0x008fffff] May 15 10:38:28.822270 kernel: e820: reserve RAM buffer [mem 0x9b438018-0x9bffffff] May 15 10:38:28.822277 kernel: e820: reserve RAM buffer [mem 0x9b475018-0x9bffffff] May 15 10:38:28.822284 kernel: e820: reserve RAM buffer [mem 0x9c8ef000-0x9fffffff] May 15 10:38:28.822291 kernel: e820: reserve RAM buffer [mem 0x9cf40000-0x9fffffff] May 15 10:38:28.822299 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 May 15 10:38:28.822306 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter May 15 10:38:28.822315 kernel: clocksource: Switched to clocksource kvm-clock May 15 10:38:28.822324 kernel: VFS: Disk quotas dquot_6.6.0 May 15 10:38:28.822333 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) May 15 10:38:28.822342 kernel: pnp: PnP ACPI init May 15 10:38:28.822459 kernel: system 00:05: [mem 0xb0000000-0xbfffffff window] has been reserved May 15 10:38:28.822477 kernel: pnp: PnP ACPI: found 6 devices May 15 10:38:28.822490 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns May 15 10:38:28.822500 kernel: NET: Registered PF_INET protocol family May 15 10:38:28.822509 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) May 15 10:38:28.822518 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) May 15 10:38:28.822527 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) May 15 10:38:28.822535 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) May 15 10:38:28.822544 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) May 15 10:38:28.822552 kernel: TCP: Hash tables configured (established 32768 bind 32768) May 15 10:38:28.822560 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:38:28.822571 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) May 15 10:38:28.822579 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family May 15 10:38:28.822588 kernel: NET: Registered PF_XDP protocol family May 15 10:38:28.822708 kernel: pci 0000:00:04.0: can't claim BAR 6 [mem 0xfffc0000-0xffffffff pref]: no compatible bridge window May 15 10:38:28.822831 kernel: pci 0000:00:04.0: BAR 6: assigned [mem 0x9d000000-0x9d03ffff pref] May 15 10:38:28.822943 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] May 15 10:38:28.823037 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] May 15 10:38:28.823127 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] May 15 10:38:28.823222 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xafffffff window] May 15 10:38:28.823358 kernel: pci_bus 0000:00: resource 8 [mem 0xc0000000-0xfebfffff window] May 15 10:38:28.823462 kernel: pci_bus 0000:00: resource 9 [mem 0x800000000-0xfffffffff window] May 15 10:38:28.823478 kernel: PCI: CLS 0 bytes, default 64 May 15 10:38:28.823488 kernel: Initialise system trusted keyrings May 15 10:38:28.823497 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 May 15 10:38:28.823507 kernel: Key type asymmetric registered May 15 10:38:28.823516 kernel: Asymmetric key parser 'x509' registered May 15 10:38:28.823530 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) May 15 10:38:28.823541 kernel: io scheduler mq-deadline registered May 15 10:38:28.823563 kernel: io scheduler kyber registered May 15 10:38:28.823574 kernel: io scheduler bfq registered May 15 10:38:28.823584 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 May 15 10:38:28.823594 kernel: ACPI: \_SB_.GSIG: Enabled at IRQ 22 May 15 10:38:28.823609 kernel: ACPI: \_SB_.GSIH: Enabled at IRQ 23 May 15 10:38:28.823621 kernel: ACPI: \_SB_.GSIE: Enabled at IRQ 20 May 15 10:38:28.823631 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled May 15 10:38:28.823645 kernel: 00:03: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A May 15 10:38:28.823664 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 May 15 10:38:28.823673 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 May 15 10:38:28.823682 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 May 15 10:38:28.823785 kernel: rtc_cmos 00:04: RTC can wake from S4 May 15 10:38:28.823812 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 May 15 10:38:28.823892 kernel: rtc_cmos 00:04: registered as rtc0 May 15 10:38:28.823972 kernel: rtc_cmos 00:04: setting system clock to 2025-05-15T10:38:28 UTC (1747305508) May 15 10:38:28.824059 kernel: rtc_cmos 00:04: alarms up to one day, y3k, 242 bytes nvram, hpet irqs May 15 10:38:28.824073 kernel: efifb: probing for efifb May 15 10:38:28.824083 kernel: efifb: framebuffer at 0xc0000000, using 4000k, total 4000k May 15 10:38:28.824093 kernel: efifb: mode is 1280x800x32, linelength=5120, pages=1 May 15 10:38:28.824102 kernel: efifb: scrolling: redraw May 15 10:38:28.824111 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 May 15 10:38:28.824121 kernel: Console: switching to colour frame buffer device 160x50 May 15 10:38:28.824131 kernel: fb0: EFI VGA frame buffer device May 15 10:38:28.824140 kernel: pstore: Registered efi as persistent store backend May 15 10:38:28.824153 kernel: NET: Registered PF_INET6 protocol family May 15 10:38:28.824162 kernel: Segment Routing with IPv6 May 15 10:38:28.824172 kernel: In-situ OAM (IOAM) with IPv6 May 15 10:38:28.824183 kernel: NET: Registered PF_PACKET protocol family May 15 10:38:28.824192 kernel: Key type dns_resolver registered May 15 10:38:28.824201 kernel: IPI shorthand broadcast: enabled May 15 10:38:28.824218 kernel: sched_clock: Marking stable (416121887, 127303658)->(589651457, -46225912) May 15 10:38:28.824228 kernel: registered taskstats version 1 May 15 10:38:28.824237 kernel: Loading compiled-in X.509 certificates May 15 10:38:28.824247 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.182-flatcar: 04007c306af6b7696d09b3c2eafc1297036fd28e' May 15 10:38:28.828375 kernel: Key type .fscrypt registered May 15 10:38:28.828393 kernel: Key type fscrypt-provisioning registered May 15 10:38:28.828402 kernel: pstore: Using crash dump compression: deflate May 15 10:38:28.828409 kernel: ima: No TPM chip found, activating TPM-bypass! May 15 10:38:28.828429 kernel: ima: Allocated hash algorithm: sha1 May 15 10:38:28.828436 kernel: ima: No architecture policies found May 15 10:38:28.828444 kernel: clk: Disabling unused clocks May 15 10:38:28.828451 kernel: Freeing unused kernel image (initmem) memory: 47472K May 15 10:38:28.828458 kernel: Write protecting the kernel read-only data: 28672k May 15 10:38:28.828466 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K May 15 10:38:28.828473 kernel: Freeing unused kernel image (rodata/data gap) memory: 612K May 15 10:38:28.828482 kernel: Run /init as init process May 15 10:38:28.828492 kernel: with arguments: May 15 10:38:28.828502 kernel: /init May 15 10:38:28.828513 kernel: with environment: May 15 10:38:28.828521 kernel: HOME=/ May 15 10:38:28.828528 kernel: TERM=linux May 15 10:38:28.828535 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a May 15 10:38:28.828547 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:38:28.828559 systemd[1]: Detected virtualization kvm. May 15 10:38:28.828567 systemd[1]: Detected architecture x86-64. May 15 10:38:28.828577 systemd[1]: Running in initrd. May 15 10:38:28.828585 systemd[1]: No hostname configured, using default hostname. May 15 10:38:28.828592 systemd[1]: Hostname set to . May 15 10:38:28.828600 systemd[1]: Initializing machine ID from VM UUID. May 15 10:38:28.828608 systemd[1]: Queued start job for default target initrd.target. May 15 10:38:28.828616 systemd[1]: Started systemd-ask-password-console.path. May 15 10:38:28.828623 systemd[1]: Reached target cryptsetup.target. May 15 10:38:28.828631 systemd[1]: Reached target paths.target. May 15 10:38:28.828638 systemd[1]: Reached target slices.target. May 15 10:38:28.828647 systemd[1]: Reached target swap.target. May 15 10:38:28.828663 systemd[1]: Reached target timers.target. May 15 10:38:28.828672 systemd[1]: Listening on iscsid.socket. May 15 10:38:28.828679 systemd[1]: Listening on iscsiuio.socket. May 15 10:38:28.828687 systemd[1]: Listening on systemd-journald-audit.socket. May 15 10:38:28.828696 systemd[1]: Listening on systemd-journald-dev-log.socket. May 15 10:38:28.828704 systemd[1]: Listening on systemd-journald.socket. May 15 10:38:28.828712 systemd[1]: Listening on systemd-networkd.socket. May 15 10:38:28.828720 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:38:28.828728 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:38:28.828736 systemd[1]: Reached target sockets.target. May 15 10:38:28.828743 systemd[1]: Starting kmod-static-nodes.service... May 15 10:38:28.828751 systemd[1]: Finished network-cleanup.service. May 15 10:38:28.828759 systemd[1]: Starting systemd-fsck-usr.service... May 15 10:38:28.828767 systemd[1]: Starting systemd-journald.service... May 15 10:38:28.828774 systemd[1]: Starting systemd-modules-load.service... May 15 10:38:28.828784 systemd[1]: Starting systemd-resolved.service... May 15 10:38:28.828792 systemd[1]: Starting systemd-vconsole-setup.service... May 15 10:38:28.828817 systemd[1]: Finished kmod-static-nodes.service. May 15 10:38:28.828825 systemd[1]: Finished systemd-fsck-usr.service. May 15 10:38:28.828834 kernel: audit: type=1130 audit(1747305508.814:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.828841 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... May 15 10:38:28.828849 systemd[1]: Finished systemd-vconsole-setup.service. May 15 10:38:28.828857 kernel: audit: type=1130 audit(1747305508.824:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.828865 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. May 15 10:38:28.828878 systemd-journald[197]: Journal started May 15 10:38:28.828922 systemd-journald[197]: Runtime Journal (/run/log/journal/a1bd396e866a4e63a5909fe33bc47cb5) is 6.0M, max 48.4M, 42.4M free. May 15 10:38:28.814000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.833815 kernel: audit: type=1130 audit(1747305508.829:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.833831 systemd[1]: Started systemd-journald.service. May 15 10:38:28.834043 systemd-modules-load[198]: Inserted module 'overlay' May 15 10:38:28.839427 kernel: audit: type=1130 audit(1747305508.834:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.835643 systemd[1]: Starting dracut-cmdline-ask.service... May 15 10:38:28.848309 systemd-resolved[199]: Positive Trust Anchors: May 15 10:38:28.848323 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:38:28.848350 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:38:28.850441 systemd-resolved[199]: Defaulting to hostname 'linux'. May 15 10:38:28.864123 kernel: audit: type=1130 audit(1747305508.856:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.864140 kernel: audit: type=1130 audit(1747305508.860:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.851099 systemd[1]: Started systemd-resolved.service. May 15 10:38:28.857169 systemd[1]: Finished dracut-cmdline-ask.service. May 15 10:38:28.861409 systemd[1]: Reached target nss-lookup.target. May 15 10:38:28.865562 systemd[1]: Starting dracut-cmdline.service... May 15 10:38:28.871817 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. May 15 10:38:28.873369 dracut-cmdline[214]: dracut-dracut-053 May 15 10:38:28.875263 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=f8c1bc5ff10765e781843bfc97fc5357002a3f8a120201a0e954fce1d2ba48f0 May 15 10:38:28.880896 systemd-modules-load[198]: Inserted module 'br_netfilter' May 15 10:38:28.881830 kernel: Bridge firewalling registered May 15 10:38:28.897868 kernel: SCSI subsystem initialized May 15 10:38:28.908842 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. May 15 10:38:28.908864 kernel: device-mapper: uevent: version 1.0.3 May 15 10:38:28.910217 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com May 15 10:38:28.912834 systemd-modules-load[198]: Inserted module 'dm_multipath' May 15 10:38:28.914000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.913538 systemd[1]: Finished systemd-modules-load.service. May 15 10:38:28.919286 kernel: audit: type=1130 audit(1747305508.914:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.915428 systemd[1]: Starting systemd-sysctl.service... May 15 10:38:28.922880 systemd[1]: Finished systemd-sysctl.service. May 15 10:38:28.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.927823 kernel: audit: type=1130 audit(1747305508.923:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.927847 kernel: Loading iSCSI transport class v2.0-870. May 15 10:38:28.944822 kernel: iscsi: registered transport (tcp) May 15 10:38:28.965283 kernel: iscsi: registered transport (qla4xxx) May 15 10:38:28.965307 kernel: QLogic iSCSI HBA Driver May 15 10:38:28.993565 systemd[1]: Finished dracut-cmdline.service. May 15 10:38:28.998568 kernel: audit: type=1130 audit(1747305508.993:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:28.995236 systemd[1]: Starting dracut-pre-udev.service... May 15 10:38:29.039827 kernel: raid6: avx2x4 gen() 30212 MB/s May 15 10:38:29.056825 kernel: raid6: avx2x4 xor() 7330 MB/s May 15 10:38:29.073822 kernel: raid6: avx2x2 gen() 32428 MB/s May 15 10:38:29.090820 kernel: raid6: avx2x2 xor() 19306 MB/s May 15 10:38:29.107826 kernel: raid6: avx2x1 gen() 26608 MB/s May 15 10:38:29.124821 kernel: raid6: avx2x1 xor() 15367 MB/s May 15 10:38:29.141821 kernel: raid6: sse2x4 gen() 14827 MB/s May 15 10:38:29.158821 kernel: raid6: sse2x4 xor() 7174 MB/s May 15 10:38:29.175824 kernel: raid6: sse2x2 gen() 16237 MB/s May 15 10:38:29.192825 kernel: raid6: sse2x2 xor() 9824 MB/s May 15 10:38:29.209826 kernel: raid6: sse2x1 gen() 12435 MB/s May 15 10:38:29.227198 kernel: raid6: sse2x1 xor() 7562 MB/s May 15 10:38:29.227216 kernel: raid6: using algorithm avx2x2 gen() 32428 MB/s May 15 10:38:29.227225 kernel: raid6: .... xor() 19306 MB/s, rmw enabled May 15 10:38:29.227918 kernel: raid6: using avx2x2 recovery algorithm May 15 10:38:29.239820 kernel: xor: automatically using best checksumming function avx May 15 10:38:29.326827 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no May 15 10:38:29.334983 systemd[1]: Finished dracut-pre-udev.service. May 15 10:38:29.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:29.335000 audit: BPF prog-id=7 op=LOAD May 15 10:38:29.335000 audit: BPF prog-id=8 op=LOAD May 15 10:38:29.337042 systemd[1]: Starting systemd-udevd.service... May 15 10:38:29.348312 systemd-udevd[401]: Using default interface naming scheme 'v252'. May 15 10:38:29.351684 systemd[1]: Started systemd-udevd.service. May 15 10:38:29.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:29.353196 systemd[1]: Starting dracut-pre-trigger.service... May 15 10:38:29.362552 dracut-pre-trigger[407]: rd.md=0: removing MD RAID activation May 15 10:38:29.383674 systemd[1]: Finished dracut-pre-trigger.service. May 15 10:38:29.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:29.385120 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:38:29.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:29.415124 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:38:29.440410 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) May 15 10:38:29.446981 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. May 15 10:38:29.446994 kernel: GPT:9289727 != 19775487 May 15 10:38:29.447003 kernel: GPT:Alternate GPT header not at the end of the disk. May 15 10:38:29.447011 kernel: GPT:9289727 != 19775487 May 15 10:38:29.447019 kernel: GPT: Use GNU Parted to correct GPT errors. May 15 10:38:29.447028 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:29.447040 kernel: cryptd: max_cpu_qlen set to 1000 May 15 10:38:29.457825 kernel: libata version 3.00 loaded. May 15 10:38:29.457850 kernel: AVX2 version of gcm_enc/dec engaged. May 15 10:38:29.463818 kernel: AES CTR mode by8 optimization enabled May 15 10:38:29.467814 kernel: ahci 0000:00:1f.2: version 3.0 May 15 10:38:29.490938 kernel: ACPI: \_SB_.GSIA: Enabled at IRQ 16 May 15 10:38:29.490955 kernel: ahci 0000:00:1f.2: AHCI 0001.0000 32 slots 6 ports 1.5 Gbps 0x3f impl SATA mode May 15 10:38:29.491046 kernel: ahci 0000:00:1f.2: flags: 64bit ncq only May 15 10:38:29.491121 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (443) May 15 10:38:29.491131 kernel: scsi host0: ahci May 15 10:38:29.491219 kernel: scsi host1: ahci May 15 10:38:29.491303 kernel: scsi host2: ahci May 15 10:38:29.491388 kernel: scsi host3: ahci May 15 10:38:29.491465 kernel: scsi host4: ahci May 15 10:38:29.491544 kernel: scsi host5: ahci May 15 10:38:29.491624 kernel: ata1: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040100 irq 34 May 15 10:38:29.491634 kernel: ata2: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040180 irq 34 May 15 10:38:29.491653 kernel: ata3: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040200 irq 34 May 15 10:38:29.491662 kernel: ata4: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040280 irq 34 May 15 10:38:29.491670 kernel: ata5: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040300 irq 34 May 15 10:38:29.491679 kernel: ata6: SATA max UDMA/133 abar m4096@0xc1040000 port 0xc1040380 irq 34 May 15 10:38:29.483929 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. May 15 10:38:29.488707 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. May 15 10:38:29.497626 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. May 15 10:38:29.502630 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. May 15 10:38:29.507330 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:38:29.508245 systemd[1]: Starting disk-uuid.service... May 15 10:38:29.514460 disk-uuid[538]: Primary Header is updated. May 15 10:38:29.514460 disk-uuid[538]: Secondary Entries is updated. May 15 10:38:29.514460 disk-uuid[538]: Secondary Header is updated. May 15 10:38:29.517996 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:29.519820 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:29.523821 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:29.800197 kernel: ata2: SATA link down (SStatus 0 SControl 300) May 15 10:38:29.800281 kernel: ata6: SATA link down (SStatus 0 SControl 300) May 15 10:38:29.800295 kernel: ata3: SATA link up 1.5 Gbps (SStatus 113 SControl 300) May 15 10:38:29.800308 kernel: ata4: SATA link down (SStatus 0 SControl 300) May 15 10:38:29.801824 kernel: ata1: SATA link down (SStatus 0 SControl 300) May 15 10:38:29.802836 kernel: ata3.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 May 15 10:38:29.803822 kernel: ata3.00: applying bridge limits May 15 10:38:29.803839 kernel: ata5: SATA link down (SStatus 0 SControl 300) May 15 10:38:29.804829 kernel: ata3.00: configured for UDMA/100 May 15 10:38:29.805830 kernel: scsi 2:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 May 15 10:38:29.833890 kernel: sr 2:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray May 15 10:38:29.851633 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 May 15 10:38:29.851679 kernel: sr 2:0:0:0: Attached scsi CD-ROM sr0 May 15 10:38:30.522832 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 May 15 10:38:30.523222 disk-uuid[539]: The operation has completed successfully. May 15 10:38:30.542326 systemd[1]: disk-uuid.service: Deactivated successfully. May 15 10:38:30.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.542000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.542408 systemd[1]: Finished disk-uuid.service. May 15 10:38:30.551499 systemd[1]: Starting verity-setup.service... May 15 10:38:30.562821 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" May 15 10:38:30.581117 systemd[1]: Found device dev-mapper-usr.device. May 15 10:38:30.583099 systemd[1]: Mounting sysusr-usr.mount... May 15 10:38:30.585099 systemd[1]: Finished verity-setup.service. May 15 10:38:30.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.640813 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. May 15 10:38:30.641136 systemd[1]: Mounted sysusr-usr.mount. May 15 10:38:30.642673 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. May 15 10:38:30.643340 systemd[1]: Starting ignition-setup.service... May 15 10:38:30.645282 systemd[1]: Starting parse-ip-for-networkd.service... May 15 10:38:30.654291 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:38:30.654328 kernel: BTRFS info (device vda6): using free space tree May 15 10:38:30.654341 kernel: BTRFS info (device vda6): has skinny extents May 15 10:38:30.661847 systemd[1]: mnt-oem.mount: Deactivated successfully. May 15 10:38:30.670151 systemd[1]: Finished ignition-setup.service. May 15 10:38:30.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.672314 systemd[1]: Starting ignition-fetch-offline.service... May 15 10:38:30.706293 ignition[650]: Ignition 2.14.0 May 15 10:38:30.707277 ignition[650]: Stage: fetch-offline May 15 10:38:30.707720 ignition[650]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:30.707728 ignition[650]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:30.707828 ignition[650]: parsed url from cmdline: "" May 15 10:38:30.707832 ignition[650]: no config URL provided May 15 10:38:30.707836 ignition[650]: reading system config file "/usr/lib/ignition/user.ign" May 15 10:38:30.707842 ignition[650]: no config at "/usr/lib/ignition/user.ign" May 15 10:38:30.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.713000 audit: BPF prog-id=9 op=LOAD May 15 10:38:30.711648 systemd[1]: Finished parse-ip-for-networkd.service. May 15 10:38:30.707856 ignition[650]: op(1): [started] loading QEMU firmware config module May 15 10:38:30.714763 systemd[1]: Starting systemd-networkd.service... May 15 10:38:30.707860 ignition[650]: op(1): executing: "modprobe" "qemu_fw_cfg" May 15 10:38:30.711164 ignition[650]: op(1): [finished] loading QEMU firmware config module May 15 10:38:30.755524 ignition[650]: parsing config with SHA512: 51eca48b5c8b37378cdab6958feaa20b15393bc8d86b637c0f7af2cb14997e65bd99ad2137264c9c8949f3d467366801574f6250280cbd9832464c5e677ae25b May 15 10:38:30.761963 unknown[650]: fetched base config from "system" May 15 10:38:30.763000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.762377 ignition[650]: fetch-offline: fetch-offline passed May 15 10:38:30.761973 unknown[650]: fetched user config from "qemu" May 15 10:38:30.762423 ignition[650]: Ignition finished successfully May 15 10:38:30.763816 systemd[1]: Finished ignition-fetch-offline.service. May 15 10:38:30.773682 systemd-networkd[721]: lo: Link UP May 15 10:38:30.773692 systemd-networkd[721]: lo: Gained carrier May 15 10:38:30.774105 systemd-networkd[721]: Enumeration completed May 15 10:38:30.774292 systemd-networkd[721]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:38:30.774481 systemd[1]: Started systemd-networkd.service. May 15 10:38:30.775353 systemd-networkd[721]: eth0: Link UP May 15 10:38:30.775356 systemd-networkd[721]: eth0: Gained carrier May 15 10:38:30.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.780268 systemd[1]: Reached target network.target. May 15 10:38:30.781705 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). May 15 10:38:30.783888 systemd[1]: Starting ignition-kargs.service... May 15 10:38:30.785832 systemd[1]: Starting iscsiuio.service... May 15 10:38:30.789872 systemd[1]: Started iscsiuio.service. May 15 10:38:30.790860 systemd-networkd[721]: eth0: DHCPv4 address 10.0.0.55/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:38:30.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.792942 ignition[723]: Ignition 2.14.0 May 15 10:38:30.792953 ignition[723]: Stage: kargs May 15 10:38:30.793044 ignition[723]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:30.793053 ignition[723]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:30.793987 ignition[723]: kargs: kargs passed May 15 10:38:30.794020 ignition[723]: Ignition finished successfully May 15 10:38:30.797542 systemd[1]: Starting iscsid.service... May 15 10:38:30.798971 systemd[1]: Finished ignition-kargs.service. May 15 10:38:30.800451 iscsid[732]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi May 15 10:38:30.800451 iscsid[732]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. May 15 10:38:30.800451 iscsid[732]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. May 15 10:38:30.800451 iscsid[732]: If using hardware iscsi like qla4xxx this message can be ignored. May 15 10:38:30.800451 iscsid[732]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi May 15 10:38:30.800451 iscsid[732]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf May 15 10:38:30.799000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.811399 systemd[1]: Starting ignition-disks.service... May 15 10:38:30.812855 systemd[1]: Started iscsid.service. May 15 10:38:30.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.814760 systemd[1]: Starting dracut-initqueue.service... May 15 10:38:30.818006 ignition[733]: Ignition 2.14.0 May 15 10:38:30.818016 ignition[733]: Stage: disks May 15 10:38:30.818111 ignition[733]: no configs at "/usr/lib/ignition/base.d" May 15 10:38:30.818121 ignition[733]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:30.818922 ignition[733]: disks: disks passed May 15 10:38:30.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.820507 systemd[1]: Finished ignition-disks.service. May 15 10:38:30.818956 ignition[733]: Ignition finished successfully May 15 10:38:30.822427 systemd[1]: Reached target initrd-root-device.target. May 15 10:38:30.824029 systemd[1]: Reached target local-fs-pre.target. May 15 10:38:30.829000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.825501 systemd[1]: Reached target local-fs.target. May 15 10:38:30.826261 systemd[1]: Reached target sysinit.target. May 15 10:38:30.827700 systemd[1]: Reached target basic.target. May 15 10:38:30.828604 systemd[1]: Finished dracut-initqueue.service. May 15 10:38:30.830072 systemd[1]: Reached target remote-fs-pre.target. May 15 10:38:30.831546 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:38:30.832441 systemd[1]: Reached target remote-fs.target. May 15 10:38:30.833315 systemd[1]: Starting dracut-pre-mount.service... May 15 10:38:30.840283 systemd[1]: Finished dracut-pre-mount.service. May 15 10:38:30.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.842653 systemd[1]: Starting systemd-fsck-root.service... May 15 10:38:30.852668 systemd-fsck[754]: ROOT: clean, 623/553520 files, 56023/553472 blocks May 15 10:38:30.857649 systemd[1]: Finished systemd-fsck-root.service. May 15 10:38:30.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.859470 systemd[1]: Mounting sysroot.mount... May 15 10:38:30.865817 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. May 15 10:38:30.866397 systemd[1]: Mounted sysroot.mount. May 15 10:38:30.867048 systemd[1]: Reached target initrd-root-fs.target. May 15 10:38:30.868309 systemd[1]: Mounting sysroot-usr.mount... May 15 10:38:30.869614 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. May 15 10:38:30.869666 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). May 15 10:38:30.869689 systemd[1]: Reached target ignition-diskful.target. May 15 10:38:30.871559 systemd[1]: Mounted sysroot-usr.mount. May 15 10:38:30.878085 initrd-setup-root[764]: cut: /sysroot/etc/passwd: No such file or directory May 15 10:38:30.872911 systemd[1]: Starting initrd-setup-root.service... May 15 10:38:30.880440 initrd-setup-root[772]: cut: /sysroot/etc/group: No such file or directory May 15 10:38:30.882993 initrd-setup-root[780]: cut: /sysroot/etc/shadow: No such file or directory May 15 10:38:30.886647 initrd-setup-root[788]: cut: /sysroot/etc/gshadow: No such file or directory May 15 10:38:30.908711 systemd[1]: Finished initrd-setup-root.service. May 15 10:38:30.908000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.909853 systemd[1]: Starting ignition-mount.service... May 15 10:38:30.911767 systemd[1]: Starting sysroot-boot.service... May 15 10:38:30.916254 bash[805]: umount: /sysroot/usr/share/oem: not mounted. May 15 10:38:30.924416 ignition[807]: INFO : Ignition 2.14.0 May 15 10:38:30.924416 ignition[807]: INFO : Stage: mount May 15 10:38:30.926200 ignition[807]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:30.926200 ignition[807]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:30.929121 ignition[807]: INFO : mount: mount passed May 15 10:38:30.929980 ignition[807]: INFO : Ignition finished successfully May 15 10:38:30.931531 systemd[1]: Finished sysroot-boot.service. May 15 10:38:30.931000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:30.931950 systemd[1]: Finished ignition-mount.service. May 15 10:38:31.591392 systemd[1]: Mounting sysroot-usr-share-oem.mount... May 15 10:38:31.597880 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (816) May 15 10:38:31.597902 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm May 15 10:38:31.597911 kernel: BTRFS info (device vda6): using free space tree May 15 10:38:31.599420 kernel: BTRFS info (device vda6): has skinny extents May 15 10:38:31.602404 systemd[1]: Mounted sysroot-usr-share-oem.mount. May 15 10:38:31.604708 systemd[1]: Starting ignition-files.service... May 15 10:38:31.617538 ignition[836]: INFO : Ignition 2.14.0 May 15 10:38:31.617538 ignition[836]: INFO : Stage: files May 15 10:38:31.619283 ignition[836]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:31.619283 ignition[836]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:31.619283 ignition[836]: DEBUG : files: compiled without relabeling support, skipping May 15 10:38:31.622837 ignition[836]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" May 15 10:38:31.622837 ignition[836]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" May 15 10:38:31.625913 ignition[836]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" May 15 10:38:31.625913 ignition[836]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" May 15 10:38:31.625913 ignition[836]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" May 15 10:38:31.625913 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 10:38:31.625913 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 May 15 10:38:31.623697 unknown[836]: wrote ssh authorized keys file for user: core May 15 10:38:31.682623 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK May 15 10:38:31.821334 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 10:38:31.827273 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 May 15 10:38:32.360467 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK May 15 10:38:32.583933 systemd-networkd[721]: eth0: Gained IPv6LL May 15 10:38:33.243003 ignition[836]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" May 15 10:38:33.243003 ignition[836]: INFO : files: op(b): [started] processing unit "prepare-helm.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" May 15 10:38:33.247715 ignition[836]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:38:33.268621 ignition[836]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" May 15 10:38:33.268621 ignition[836]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" May 15 10:38:33.277844 kernel: kauditd_printk_skb: 24 callbacks suppressed May 15 10:38:33.277864 kernel: audit: type=1130 audit(1747305513.271:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.271000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.277934 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" May 15 10:38:33.277934 ignition[836]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" May 15 10:38:33.277934 ignition[836]: INFO : files: files passed May 15 10:38:33.277934 ignition[836]: INFO : Ignition finished successfully May 15 10:38:33.295139 kernel: audit: type=1130 audit(1747305513.283:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.295154 kernel: audit: type=1130 audit(1747305513.286:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.295167 kernel: audit: type=1131 audit(1747305513.286:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.269928 systemd[1]: Finished ignition-files.service. May 15 10:38:33.271980 systemd[1]: Starting initrd-setup-root-after-ignition.service... May 15 10:38:33.297967 initrd-setup-root-after-ignition[859]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory May 15 10:38:33.277902 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). May 15 10:38:33.301330 initrd-setup-root-after-ignition[861]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory May 15 10:38:33.278662 systemd[1]: Starting ignition-quench.service... May 15 10:38:33.280635 systemd[1]: Finished initrd-setup-root-after-ignition.service. May 15 10:38:33.283276 systemd[1]: ignition-quench.service: Deactivated successfully. May 15 10:38:33.283339 systemd[1]: Finished ignition-quench.service. May 15 10:38:33.287818 systemd[1]: Reached target ignition-complete.target. May 15 10:38:33.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.295686 systemd[1]: Starting initrd-parse-etc.service... May 15 10:38:33.315448 kernel: audit: type=1130 audit(1747305513.308:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.315463 kernel: audit: type=1131 audit(1747305513.308:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.308000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.307174 systemd[1]: initrd-parse-etc.service: Deactivated successfully. May 15 10:38:33.307247 systemd[1]: Finished initrd-parse-etc.service. May 15 10:38:33.308349 systemd[1]: Reached target initrd-fs.target. May 15 10:38:33.315459 systemd[1]: Reached target initrd.target. May 15 10:38:33.316286 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. May 15 10:38:33.316882 systemd[1]: Starting dracut-pre-pivot.service... May 15 10:38:33.325865 systemd[1]: Finished dracut-pre-pivot.service. May 15 10:38:33.330971 kernel: audit: type=1130 audit(1747305513.325:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.326855 systemd[1]: Starting initrd-cleanup.service... May 15 10:38:33.335529 systemd[1]: Stopped target nss-lookup.target. May 15 10:38:33.337224 systemd[1]: Stopped target remote-cryptsetup.target. May 15 10:38:33.338212 systemd[1]: Stopped target timers.target. May 15 10:38:33.339816 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. May 15 10:38:33.345713 kernel: audit: type=1131 audit(1747305513.340:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.339927 systemd[1]: Stopped dracut-pre-pivot.service. May 15 10:38:33.341401 systemd[1]: Stopped target initrd.target. May 15 10:38:33.345844 systemd[1]: Stopped target basic.target. May 15 10:38:33.347354 systemd[1]: Stopped target ignition-complete.target. May 15 10:38:33.348947 systemd[1]: Stopped target ignition-diskful.target. May 15 10:38:33.350501 systemd[1]: Stopped target initrd-root-device.target. May 15 10:38:33.352222 systemd[1]: Stopped target remote-fs.target. May 15 10:38:33.353850 systemd[1]: Stopped target remote-fs-pre.target. May 15 10:38:33.355493 systemd[1]: Stopped target sysinit.target. May 15 10:38:33.357016 systemd[1]: Stopped target local-fs.target. May 15 10:38:33.358571 systemd[1]: Stopped target local-fs-pre.target. May 15 10:38:33.360128 systemd[1]: Stopped target swap.target. May 15 10:38:33.367381 kernel: audit: type=1131 audit(1747305513.363:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.361572 systemd[1]: dracut-pre-mount.service: Deactivated successfully. May 15 10:38:33.361690 systemd[1]: Stopped dracut-pre-mount.service. May 15 10:38:33.373686 kernel: audit: type=1131 audit(1747305513.369:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.373000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.363235 systemd[1]: Stopped target cryptsetup.target. May 15 10:38:33.367435 systemd[1]: dracut-initqueue.service: Deactivated successfully. May 15 10:38:33.367541 systemd[1]: Stopped dracut-initqueue.service. May 15 10:38:33.369294 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. May 15 10:38:33.369397 systemd[1]: Stopped ignition-fetch-offline.service. May 15 10:38:33.373757 systemd[1]: Stopped target paths.target. May 15 10:38:33.374572 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. May 15 10:38:33.377842 systemd[1]: Stopped systemd-ask-password-console.path. May 15 10:38:33.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.379042 systemd[1]: Stopped target slices.target. May 15 10:38:33.384000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.380588 systemd[1]: Stopped target sockets.target. May 15 10:38:33.382063 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. May 15 10:38:33.389568 iscsid[732]: iscsid shutting down. May 15 10:38:33.382174 systemd[1]: Stopped initrd-setup-root-after-ignition.service. May 15 10:38:33.384092 systemd[1]: ignition-files.service: Deactivated successfully. May 15 10:38:33.394627 ignition[876]: INFO : Ignition 2.14.0 May 15 10:38:33.394627 ignition[876]: INFO : Stage: umount May 15 10:38:33.394627 ignition[876]: INFO : no configs at "/usr/lib/ignition/base.d" May 15 10:38:33.394627 ignition[876]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" May 15 10:38:33.394627 ignition[876]: INFO : umount: umount passed May 15 10:38:33.394627 ignition[876]: INFO : Ignition finished successfully May 15 10:38:33.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.396000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.384190 systemd[1]: Stopped ignition-files.service. May 15 10:38:33.386417 systemd[1]: Stopping ignition-mount.service... May 15 10:38:33.387990 systemd[1]: Stopping iscsid.service... May 15 10:38:33.389564 systemd[1]: kmod-static-nodes.service: Deactivated successfully. May 15 10:38:33.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.389727 systemd[1]: Stopped kmod-static-nodes.service. May 15 10:38:33.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.391983 systemd[1]: Stopping sysroot-boot.service... May 15 10:38:33.392780 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. May 15 10:38:33.392920 systemd[1]: Stopped systemd-udev-trigger.service. May 15 10:38:33.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.394724 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. May 15 10:38:33.394840 systemd[1]: Stopped dracut-pre-trigger.service. May 15 10:38:33.398101 systemd[1]: iscsid.service: Deactivated successfully. May 15 10:38:33.398174 systemd[1]: Stopped iscsid.service. May 15 10:38:33.400429 systemd[1]: ignition-mount.service: Deactivated successfully. May 15 10:38:33.400492 systemd[1]: Stopped ignition-mount.service. May 15 10:38:33.402609 systemd[1]: initrd-cleanup.service: Deactivated successfully. May 15 10:38:33.402673 systemd[1]: Finished initrd-cleanup.service. May 15 10:38:33.404937 systemd[1]: sysroot-boot.mount: Deactivated successfully. May 15 10:38:33.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.405166 systemd[1]: iscsid.socket: Deactivated successfully. May 15 10:38:33.405190 systemd[1]: Closed iscsid.socket. May 15 10:38:33.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.406187 systemd[1]: ignition-disks.service: Deactivated successfully. May 15 10:38:33.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.406217 systemd[1]: Stopped ignition-disks.service. May 15 10:38:33.407649 systemd[1]: ignition-kargs.service: Deactivated successfully. May 15 10:38:33.407680 systemd[1]: Stopped ignition-kargs.service. May 15 10:38:33.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.409561 systemd[1]: ignition-setup.service: Deactivated successfully. May 15 10:38:33.409601 systemd[1]: Stopped ignition-setup.service. May 15 10:38:33.410082 systemd[1]: Stopping iscsiuio.service... May 15 10:38:33.441000 audit: BPF prog-id=6 op=UNLOAD May 15 10:38:33.412865 systemd[1]: iscsiuio.service: Deactivated successfully. May 15 10:38:33.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.412956 systemd[1]: Stopped iscsiuio.service. May 15 10:38:33.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.414789 systemd[1]: Stopped target network.target. May 15 10:38:33.416289 systemd[1]: iscsiuio.socket: Deactivated successfully. May 15 10:38:33.416318 systemd[1]: Closed iscsiuio.socket. May 15 10:38:33.418073 systemd[1]: Stopping systemd-networkd.service... May 15 10:38:33.419663 systemd[1]: Stopping systemd-resolved.service... May 15 10:38:33.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.452000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.423837 systemd-networkd[721]: eth0: DHCPv6 lease lost May 15 10:38:33.452000 audit: BPF prog-id=9 op=UNLOAD May 15 10:38:33.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.424737 systemd[1]: systemd-networkd.service: Deactivated successfully. May 15 10:38:33.425142 systemd[1]: Stopped systemd-networkd.service. May 15 10:38:33.426951 systemd[1]: systemd-networkd.socket: Deactivated successfully. May 15 10:38:33.426988 systemd[1]: Closed systemd-networkd.socket. May 15 10:38:33.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.428727 systemd[1]: Stopping network-cleanup.service... May 15 10:38:33.429963 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. May 15 10:38:33.430009 systemd[1]: Stopped parse-ip-for-networkd.service. May 15 10:38:33.431562 systemd[1]: systemd-sysctl.service: Deactivated successfully. May 15 10:38:33.431603 systemd[1]: Stopped systemd-sysctl.service. May 15 10:38:33.432446 systemd[1]: systemd-modules-load.service: Deactivated successfully. May 15 10:38:33.432476 systemd[1]: Stopped systemd-modules-load.service. May 15 10:38:33.434318 systemd[1]: Stopping systemd-udevd.service... May 15 10:38:33.435923 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. May 15 10:38:33.436313 systemd[1]: systemd-resolved.service: Deactivated successfully. May 15 10:38:33.436389 systemd[1]: Stopped systemd-resolved.service. May 15 10:38:33.442332 systemd[1]: network-cleanup.service: Deactivated successfully. May 15 10:38:33.442407 systemd[1]: Stopped network-cleanup.service. May 15 10:38:33.444141 systemd[1]: systemd-udevd.service: Deactivated successfully. May 15 10:38:33.444241 systemd[1]: Stopped systemd-udevd.service. May 15 10:38:33.446470 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. May 15 10:38:33.446500 systemd[1]: Closed systemd-udevd-control.socket. May 15 10:38:33.448117 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. May 15 10:38:33.448146 systemd[1]: Closed systemd-udevd-kernel.socket. May 15 10:38:33.449630 systemd[1]: dracut-pre-udev.service: Deactivated successfully. May 15 10:38:33.449663 systemd[1]: Stopped dracut-pre-udev.service. May 15 10:38:33.451324 systemd[1]: dracut-cmdline.service: Deactivated successfully. May 15 10:38:33.451357 systemd[1]: Stopped dracut-cmdline.service. May 15 10:38:33.453016 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. May 15 10:38:33.453047 systemd[1]: Stopped dracut-cmdline-ask.service. May 15 10:38:33.454821 systemd[1]: Starting initrd-udevadm-cleanup-db.service... May 15 10:38:33.455333 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. May 15 10:38:33.455378 systemd[1]: Stopped systemd-vconsole-setup.service. May 15 10:38:33.489058 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. May 15 10:38:33.489148 systemd[1]: Finished initrd-udevadm-cleanup-db.service. May 15 10:38:33.491174 systemd[1]: sysroot-boot.service: Deactivated successfully. May 15 10:38:33.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.491247 systemd[1]: Stopped sysroot-boot.service. May 15 10:38:33.491624 systemd[1]: Reached target initrd-switch-root.target. May 15 10:38:33.493711 systemd[1]: initrd-setup-root.service: Deactivated successfully. May 15 10:38:33.493746 systemd[1]: Stopped initrd-setup-root.service. May 15 10:38:33.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.495838 systemd[1]: Starting initrd-switch-root.service... May 15 10:38:33.511975 systemd[1]: Switching root. May 15 10:38:33.530556 systemd-journald[197]: Journal stopped May 15 10:38:36.003990 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). May 15 10:38:36.004052 kernel: SELinux: Class mctp_socket not defined in policy. May 15 10:38:36.004071 kernel: SELinux: Class anon_inode not defined in policy. May 15 10:38:36.004086 kernel: SELinux: the above unknown classes and permissions will be allowed May 15 10:38:36.004101 kernel: SELinux: policy capability network_peer_controls=1 May 15 10:38:36.004115 kernel: SELinux: policy capability open_perms=1 May 15 10:38:36.004128 kernel: SELinux: policy capability extended_socket_class=1 May 15 10:38:36.004142 kernel: SELinux: policy capability always_check_network=0 May 15 10:38:36.004160 kernel: SELinux: policy capability cgroup_seclabel=1 May 15 10:38:36.004175 kernel: SELinux: policy capability nnp_nosuid_transition=1 May 15 10:38:36.004190 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 May 15 10:38:36.004211 kernel: SELinux: policy capability ioctl_skip_cloexec=0 May 15 10:38:36.004227 systemd[1]: Successfully loaded SELinux policy in 39.180ms. May 15 10:38:36.004248 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.695ms. May 15 10:38:36.004265 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) May 15 10:38:36.004281 systemd[1]: Detected virtualization kvm. May 15 10:38:36.004299 systemd[1]: Detected architecture x86-64. May 15 10:38:36.004315 systemd[1]: Detected first boot. May 15 10:38:36.004331 systemd[1]: Initializing machine ID from VM UUID. May 15 10:38:36.004347 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). May 15 10:38:36.004366 systemd[1]: Populated /etc with preset unit settings. May 15 10:38:36.004382 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:36.004399 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:36.004416 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:36.004435 systemd[1]: initrd-switch-root.service: Deactivated successfully. May 15 10:38:36.004453 systemd[1]: Stopped initrd-switch-root.service. May 15 10:38:36.004469 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. May 15 10:38:36.004485 systemd[1]: Created slice system-addon\x2dconfig.slice. May 15 10:38:36.004500 systemd[1]: Created slice system-addon\x2drun.slice. May 15 10:38:36.004525 systemd[1]: Created slice system-getty.slice. May 15 10:38:36.004556 systemd[1]: Created slice system-modprobe.slice. May 15 10:38:36.004579 systemd[1]: Created slice system-serial\x2dgetty.slice. May 15 10:38:36.004598 systemd[1]: Created slice system-system\x2dcloudinit.slice. May 15 10:38:36.004613 systemd[1]: Created slice system-systemd\x2dfsck.slice. May 15 10:38:36.004628 systemd[1]: Created slice user.slice. May 15 10:38:36.004642 systemd[1]: Started systemd-ask-password-console.path. May 15 10:38:36.004657 systemd[1]: Started systemd-ask-password-wall.path. May 15 10:38:36.004671 systemd[1]: Set up automount boot.automount. May 15 10:38:36.004687 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. May 15 10:38:36.004706 systemd[1]: Stopped target initrd-switch-root.target. May 15 10:38:36.004722 systemd[1]: Stopped target initrd-fs.target. May 15 10:38:36.004738 systemd[1]: Stopped target initrd-root-fs.target. May 15 10:38:36.004758 systemd[1]: Reached target integritysetup.target. May 15 10:38:36.004774 systemd[1]: Reached target remote-cryptsetup.target. May 15 10:38:36.004789 systemd[1]: Reached target remote-fs.target. May 15 10:38:36.004823 systemd[1]: Reached target slices.target. May 15 10:38:36.004840 systemd[1]: Reached target swap.target. May 15 10:38:36.004859 systemd[1]: Reached target torcx.target. May 15 10:38:36.004875 systemd[1]: Reached target veritysetup.target. May 15 10:38:36.004893 systemd[1]: Listening on systemd-coredump.socket. May 15 10:38:36.004908 systemd[1]: Listening on systemd-initctl.socket. May 15 10:38:36.004923 systemd[1]: Listening on systemd-networkd.socket. May 15 10:38:36.004938 systemd[1]: Listening on systemd-udevd-control.socket. May 15 10:38:36.004953 systemd[1]: Listening on systemd-udevd-kernel.socket. May 15 10:38:36.004968 systemd[1]: Listening on systemd-userdbd.socket. May 15 10:38:36.004984 systemd[1]: Mounting dev-hugepages.mount... May 15 10:38:36.005002 systemd[1]: Mounting dev-mqueue.mount... May 15 10:38:36.005018 systemd[1]: Mounting media.mount... May 15 10:38:36.005033 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:36.005049 systemd[1]: Mounting sys-kernel-debug.mount... May 15 10:38:36.005063 systemd[1]: Mounting sys-kernel-tracing.mount... May 15 10:38:36.005078 systemd[1]: Mounting tmp.mount... May 15 10:38:36.005094 systemd[1]: Starting flatcar-tmpfiles.service... May 15 10:38:36.005109 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:36.005123 systemd[1]: Starting kmod-static-nodes.service... May 15 10:38:36.005141 systemd[1]: Starting modprobe@configfs.service... May 15 10:38:36.005156 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:36.005176 systemd[1]: Starting modprobe@drm.service... May 15 10:38:36.005196 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:36.005215 systemd[1]: Starting modprobe@fuse.service... May 15 10:38:36.005236 systemd[1]: Starting modprobe@loop.service... May 15 10:38:36.006191 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). May 15 10:38:36.006213 systemd[1]: systemd-fsck-root.service: Deactivated successfully. May 15 10:38:36.006229 systemd[1]: Stopped systemd-fsck-root.service. May 15 10:38:36.006248 kernel: loop: module loaded May 15 10:38:36.006264 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. May 15 10:38:36.006281 systemd[1]: Stopped systemd-fsck-usr.service. May 15 10:38:36.006296 systemd[1]: Stopped systemd-journald.service. May 15 10:38:36.006310 kernel: fuse: init (API version 7.34) May 15 10:38:36.006325 systemd[1]: Starting systemd-journald.service... May 15 10:38:36.006341 systemd[1]: Starting systemd-modules-load.service... May 15 10:38:36.006355 systemd[1]: Starting systemd-network-generator.service... May 15 10:38:36.006372 systemd[1]: Starting systemd-remount-fs.service... May 15 10:38:36.006390 systemd[1]: Starting systemd-udev-trigger.service... May 15 10:38:36.006415 systemd[1]: verity-setup.service: Deactivated successfully. May 15 10:38:36.006429 systemd[1]: Stopped verity-setup.service. May 15 10:38:36.006452 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:36.006471 systemd[1]: Mounted dev-hugepages.mount. May 15 10:38:36.006485 systemd[1]: Mounted dev-mqueue.mount. May 15 10:38:36.006502 systemd-journald[995]: Journal started May 15 10:38:36.006568 systemd-journald[995]: Runtime Journal (/run/log/journal/a1bd396e866a4e63a5909fe33bc47cb5) is 6.0M, max 48.4M, 42.4M free. May 15 10:38:33.589000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 May 15 10:38:33.801000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:38:33.801000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 May 15 10:38:33.801000 audit: BPF prog-id=10 op=LOAD May 15 10:38:33.801000 audit: BPF prog-id=10 op=UNLOAD May 15 10:38:33.801000 audit: BPF prog-id=11 op=LOAD May 15 10:38:33.801000 audit: BPF prog-id=11 op=UNLOAD May 15 10:38:33.833000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" May 15 10:38:33.833000 audit[910]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858d2 a1=c00002ae40 a2=c000029080 a3=32 items=0 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:33.833000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:38:33.834000 audit[910]: AVC avc: denied { associate } for pid=910 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 May 15 10:38:33.834000 audit[910]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859a9 a2=1ed a3=0 items=2 ppid=893 pid=910 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:33.834000 audit: CWD cwd="/" May 15 10:38:33.834000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:33.834000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:33.834000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 May 15 10:38:35.873000 audit: BPF prog-id=12 op=LOAD May 15 10:38:35.873000 audit: BPF prog-id=3 op=UNLOAD May 15 10:38:35.873000 audit: BPF prog-id=13 op=LOAD May 15 10:38:35.873000 audit: BPF prog-id=14 op=LOAD May 15 10:38:35.873000 audit: BPF prog-id=4 op=UNLOAD May 15 10:38:35.873000 audit: BPF prog-id=5 op=UNLOAD May 15 10:38:35.874000 audit: BPF prog-id=15 op=LOAD May 15 10:38:35.874000 audit: BPF prog-id=12 op=UNLOAD May 15 10:38:35.874000 audit: BPF prog-id=16 op=LOAD May 15 10:38:35.874000 audit: BPF prog-id=17 op=LOAD May 15 10:38:35.874000 audit: BPF prog-id=13 op=UNLOAD May 15 10:38:35.874000 audit: BPF prog-id=14 op=UNLOAD May 15 10:38:35.875000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.883000 audit: BPF prog-id=15 op=UNLOAD May 15 10:38:35.975000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.009750 systemd[1]: Started systemd-journald.service. May 15 10:38:35.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.982000 audit: BPF prog-id=18 op=LOAD May 15 10:38:35.983000 audit: BPF prog-id=19 op=LOAD May 15 10:38:35.983000 audit: BPF prog-id=20 op=LOAD May 15 10:38:35.983000 audit: BPF prog-id=16 op=UNLOAD May 15 10:38:35.983000 audit: BPF prog-id=17 op=UNLOAD May 15 10:38:36.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.001000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 May 15 10:38:36.001000 audit[995]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffec9d539b0 a2=4000 a3=7ffec9d53a4c items=0 ppid=1 pid=995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:36.001000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" May 15 10:38:36.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.832598 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:35.872693 systemd[1]: Queued start job for default target multi-user.target. May 15 10:38:36.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.832897 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:38:35.872702 systemd[1]: Unnecessary job was removed for dev-vda6.device. May 15 10:38:36.015000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.832917 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:38:35.875656 systemd[1]: systemd-journald.service: Deactivated successfully. May 15 10:38:33.832946 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" May 15 10:38:36.009785 systemd[1]: Mounted media.mount. May 15 10:38:36.016000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.016000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.832956 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="skipped missing lower profile" missing profile=oem May 15 10:38:36.010693 systemd[1]: Mounted sys-kernel-debug.mount. May 15 10:38:33.832992 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" May 15 10:38:36.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.018000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.011742 systemd[1]: Mounted sys-kernel-tracing.mount. May 15 10:38:33.833005 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= May 15 10:38:36.012837 systemd[1]: Mounted tmp.mount. May 15 10:38:36.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.833182 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack May 15 10:38:36.013877 systemd[1]: Finished flatcar-tmpfiles.service. May 15 10:38:33.833215 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json May 15 10:38:36.015174 systemd[1]: Finished kmod-static-nodes.service. May 15 10:38:36.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.020000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.833227 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json May 15 10:38:36.016338 systemd[1]: modprobe@configfs.service: Deactivated successfully. May 15 10:38:33.833540 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 May 15 10:38:36.016508 systemd[1]: Finished modprobe@configfs.service. May 15 10:38:33.833582 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl May 15 10:38:36.017782 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:36.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.833599 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.100: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.100 May 15 10:38:36.017951 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:33.833611 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store May 15 10:38:36.019210 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:38:33.833625 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.100: no such file or directory" path=/var/lib/torcx/store/3510.3.100 May 15 10:38:36.019352 systemd[1]: Finished modprobe@drm.service. May 15 10:38:36.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:33.833637 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:33Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store May 15 10:38:36.020571 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:35.629404 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:35Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:36.020695 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:35.629668 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:35Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:36.021951 systemd[1]: modprobe@fuse.service: Deactivated successfully. May 15 10:38:36.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:35.629752 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:35Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:36.022083 systemd[1]: Finished modprobe@fuse.service. May 15 10:38:35.629915 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:35Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl May 15 10:38:36.023130 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:35.629958 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:35Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= May 15 10:38:36.023262 systemd[1]: Finished modprobe@loop.service. May 15 10:38:35.630009 /usr/lib/systemd/system-generators/torcx-generator[910]: time="2025-05-15T10:38:35Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx May 15 10:38:36.024414 systemd[1]: Finished systemd-modules-load.service. May 15 10:38:36.025579 systemd[1]: Finished systemd-network-generator.service. May 15 10:38:36.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.026789 systemd[1]: Finished systemd-remount-fs.service. May 15 10:38:36.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.028010 systemd[1]: Reached target network-pre.target. May 15 10:38:36.029847 systemd[1]: Mounting sys-fs-fuse-connections.mount... May 15 10:38:36.031632 systemd[1]: Mounting sys-kernel-config.mount... May 15 10:38:36.032375 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). May 15 10:38:36.033820 systemd[1]: Starting systemd-hwdb-update.service... May 15 10:38:36.035706 systemd[1]: Starting systemd-journal-flush.service... May 15 10:38:36.036649 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:36.037404 systemd[1]: Starting systemd-random-seed.service... May 15 10:38:36.038462 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:36.039421 systemd[1]: Starting systemd-sysctl.service... May 15 10:38:36.041371 systemd[1]: Starting systemd-sysusers.service... May 15 10:38:36.044190 systemd-journald[995]: Time spent on flushing to /var/log/journal/a1bd396e866a4e63a5909fe33bc47cb5 is 15.284ms for 1162 entries. May 15 10:38:36.044190 systemd-journald[995]: System Journal (/var/log/journal/a1bd396e866a4e63a5909fe33bc47cb5) is 8.0M, max 195.6M, 187.6M free. May 15 10:38:36.072980 systemd-journald[995]: Received client request to flush runtime journal. May 15 10:38:36.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.044393 systemd[1]: Finished systemd-udev-trigger.service. May 15 10:38:36.073950 udevadm[1015]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. May 15 10:38:36.047127 systemd[1]: Mounted sys-fs-fuse-connections.mount. May 15 10:38:36.048326 systemd[1]: Mounted sys-kernel-config.mount. May 15 10:38:36.049520 systemd[1]: Finished systemd-random-seed.service. May 15 10:38:36.050690 systemd[1]: Reached target first-boot-complete.target. May 15 10:38:36.053209 systemd[1]: Starting systemd-udev-settle.service... May 15 10:38:36.054214 systemd[1]: Finished systemd-sysctl.service. May 15 10:38:36.062408 systemd[1]: Finished systemd-sysusers.service. May 15 10:38:36.074658 systemd[1]: Finished systemd-journal-flush.service. May 15 10:38:36.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.460424 systemd[1]: Finished systemd-hwdb-update.service. May 15 10:38:36.460000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.461000 audit: BPF prog-id=21 op=LOAD May 15 10:38:36.461000 audit: BPF prog-id=22 op=LOAD May 15 10:38:36.461000 audit: BPF prog-id=7 op=UNLOAD May 15 10:38:36.461000 audit: BPF prog-id=8 op=UNLOAD May 15 10:38:36.462662 systemd[1]: Starting systemd-udevd.service... May 15 10:38:36.477582 systemd-udevd[1017]: Using default interface naming scheme 'v252'. May 15 10:38:36.489365 systemd[1]: Started systemd-udevd.service. May 15 10:38:36.489000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.490000 audit: BPF prog-id=23 op=LOAD May 15 10:38:36.492496 systemd[1]: Starting systemd-networkd.service... May 15 10:38:36.495000 audit: BPF prog-id=24 op=LOAD May 15 10:38:36.495000 audit: BPF prog-id=25 op=LOAD May 15 10:38:36.495000 audit: BPF prog-id=26 op=LOAD May 15 10:38:36.496550 systemd[1]: Starting systemd-userdbd.service... May 15 10:38:36.522835 systemd[1]: Started systemd-userdbd.service. May 15 10:38:36.522000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.540820 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 May 15 10:38:36.545817 kernel: ACPI: button: Power Button [PWRF] May 15 10:38:36.554991 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. May 15 10:38:36.566230 systemd-networkd[1025]: lo: Link UP May 15 10:38:36.566238 systemd-networkd[1025]: lo: Gained carrier May 15 10:38:36.566567 systemd-networkd[1025]: Enumeration completed May 15 10:38:36.566646 systemd[1]: Started systemd-networkd.service. May 15 10:38:36.566000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.568075 systemd-networkd[1025]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. May 15 10:38:36.569022 systemd-networkd[1025]: eth0: Link UP May 15 10:38:36.569027 systemd-networkd[1025]: eth0: Gained carrier May 15 10:38:36.570298 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. May 15 10:38:36.580973 systemd-networkd[1025]: eth0: DHCPv4 address 10.0.0.55/16, gateway 10.0.0.1 acquired from 10.0.0.1 May 15 10:38:36.567000 audit[1030]: AVC avc: denied { confidentiality } for pid=1030 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 May 15 10:38:36.567000 audit[1030]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=56441a4f8a80 a1=338ac a2=7fc7b097fbc5 a3=5 items=110 ppid=1017 pid=1030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:36.567000 audit: CWD cwd="/" May 15 10:38:36.567000 audit: PATH item=0 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=1 name=(null) inode=10886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=2 name=(null) inode=10886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=3 name=(null) inode=10887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=4 name=(null) inode=10886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=5 name=(null) inode=10888 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=6 name=(null) inode=10886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=7 name=(null) inode=10889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=8 name=(null) inode=10889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=9 name=(null) inode=10890 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=10 name=(null) inode=10889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=11 name=(null) inode=10891 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=12 name=(null) inode=10889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=13 name=(null) inode=10892 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=14 name=(null) inode=10889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=15 name=(null) inode=10893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=16 name=(null) inode=10889 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=17 name=(null) inode=10894 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=18 name=(null) inode=10886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=19 name=(null) inode=10895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=20 name=(null) inode=10895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=21 name=(null) inode=10896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=22 name=(null) inode=10895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=23 name=(null) inode=10897 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=24 name=(null) inode=10895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=25 name=(null) inode=10898 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=26 name=(null) inode=10895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=27 name=(null) inode=10899 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=28 name=(null) inode=10895 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=29 name=(null) inode=10900 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=30 name=(null) inode=10886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=31 name=(null) inode=10901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=32 name=(null) inode=10901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=33 name=(null) inode=10902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=34 name=(null) inode=10901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=35 name=(null) inode=10903 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=36 name=(null) inode=10901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=37 name=(null) inode=10904 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=38 name=(null) inode=10901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=39 name=(null) inode=10905 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=40 name=(null) inode=10901 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=41 name=(null) inode=10906 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=42 name=(null) inode=10886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=43 name=(null) inode=10907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=44 name=(null) inode=10907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=45 name=(null) inode=10908 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=46 name=(null) inode=10907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=47 name=(null) inode=10909 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=48 name=(null) inode=10907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=49 name=(null) inode=10910 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=50 name=(null) inode=10907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=51 name=(null) inode=10911 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=52 name=(null) inode=10907 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=53 name=(null) inode=10912 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=54 name=(null) inode=50 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=55 name=(null) inode=10913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=56 name=(null) inode=10913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=57 name=(null) inode=10914 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=58 name=(null) inode=10913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=59 name=(null) inode=10915 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=60 name=(null) inode=10913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=61 name=(null) inode=10916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=62 name=(null) inode=10916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=63 name=(null) inode=10917 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=64 name=(null) inode=10916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=65 name=(null) inode=10918 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=66 name=(null) inode=10916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=67 name=(null) inode=10919 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=68 name=(null) inode=10916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=69 name=(null) inode=10920 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=70 name=(null) inode=10916 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=71 name=(null) inode=10921 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=72 name=(null) inode=10913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=73 name=(null) inode=10922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=74 name=(null) inode=10922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=75 name=(null) inode=10923 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=76 name=(null) inode=10922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=77 name=(null) inode=10924 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=78 name=(null) inode=10922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=79 name=(null) inode=10925 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=80 name=(null) inode=10922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=81 name=(null) inode=10926 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=82 name=(null) inode=10922 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=83 name=(null) inode=10927 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=84 name=(null) inode=10913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=85 name=(null) inode=10928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=86 name=(null) inode=10928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=87 name=(null) inode=10929 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=88 name=(null) inode=10928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=89 name=(null) inode=10930 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=90 name=(null) inode=10928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=91 name=(null) inode=10931 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=92 name=(null) inode=10928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=93 name=(null) inode=10932 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=94 name=(null) inode=10928 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=95 name=(null) inode=10933 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=96 name=(null) inode=10913 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=97 name=(null) inode=10934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=98 name=(null) inode=10934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=99 name=(null) inode=10935 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=100 name=(null) inode=10934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=101 name=(null) inode=10936 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=102 name=(null) inode=10934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=103 name=(null) inode=10937 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=104 name=(null) inode=10934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=105 name=(null) inode=10938 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=106 name=(null) inode=10934 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=107 name=(null) inode=10939 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=108 name=(null) inode=1 dev=00:07 mode=040700 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PATH item=109 name=(null) inode=10940 dev=00:07 mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:debugfs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:38:36.567000 audit: PROCTITLE proctitle="(udev-worker)" May 15 10:38:36.594280 kernel: i801_smbus 0000:00:1f.3: Enabling SMBus device May 15 10:38:36.596557 kernel: i801_smbus 0000:00:1f.3: SMBus using PCI interrupt May 15 10:38:36.596674 kernel: i2c i2c-0: 1/1 memory slots populated (from DMI) May 15 10:38:36.596778 kernel: i2c i2c-0: Memory type 0x07 not supported yet, not instantiating SPD May 15 10:38:36.605820 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 May 15 10:38:36.609835 kernel: mousedev: PS/2 mouse device common for all mice May 15 10:38:36.643231 kernel: kvm: Nested Virtualization enabled May 15 10:38:36.643295 kernel: SVM: kvm: Nested Paging enabled May 15 10:38:36.643316 kernel: SVM: Virtual VMLOAD VMSAVE supported May 15 10:38:36.643331 kernel: SVM: Virtual GIF supported May 15 10:38:36.658821 kernel: EDAC MC: Ver: 3.0.0 May 15 10:38:36.684197 systemd[1]: Finished systemd-udev-settle.service. May 15 10:38:36.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.686266 systemd[1]: Starting lvm2-activation-early.service... May 15 10:38:36.693953 lvm[1054]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:38:36.719714 systemd[1]: Finished lvm2-activation-early.service. May 15 10:38:36.720000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.720693 systemd[1]: Reached target cryptsetup.target. May 15 10:38:36.722316 systemd[1]: Starting lvm2-activation.service... May 15 10:38:36.726012 lvm[1055]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. May 15 10:38:36.751947 systemd[1]: Finished lvm2-activation.service. May 15 10:38:36.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.752948 systemd[1]: Reached target local-fs-pre.target. May 15 10:38:36.753815 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). May 15 10:38:36.753840 systemd[1]: Reached target local-fs.target. May 15 10:38:36.754655 systemd[1]: Reached target machines.target. May 15 10:38:36.756526 systemd[1]: Starting ldconfig.service... May 15 10:38:36.757456 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:36.757497 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:36.758322 systemd[1]: Starting systemd-boot-update.service... May 15 10:38:36.760249 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... May 15 10:38:36.762094 systemd[1]: Starting systemd-machine-id-commit.service... May 15 10:38:36.764076 systemd[1]: Starting systemd-sysext.service... May 15 10:38:36.765266 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1057 (bootctl) May 15 10:38:36.766343 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... May 15 10:38:36.773625 systemd[1]: Unmounting usr-share-oem.mount... May 15 10:38:36.776705 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. May 15 10:38:36.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.778229 systemd[1]: usr-share-oem.mount: Deactivated successfully. May 15 10:38:36.778379 systemd[1]: Unmounted usr-share-oem.mount. May 15 10:38:36.787475 kernel: loop0: detected capacity change from 0 to 205544 May 15 10:38:36.811241 systemd-fsck[1065]: fsck.fat 4.2 (2021-01-31) May 15 10:38:36.811241 systemd-fsck[1065]: /dev/vda1: 791 files, 120752/258078 clusters May 15 10:38:36.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.812994 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. May 15 10:38:36.817123 systemd[1]: Mounting boot.mount... May 15 10:38:36.968320 systemd[1]: Mounted boot.mount. May 15 10:38:36.977914 systemd[1]: Finished systemd-machine-id-commit.service. May 15 10:38:36.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.980820 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher May 15 10:38:36.984497 systemd[1]: Finished systemd-boot-update.service. May 15 10:38:36.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:36.993812 kernel: loop1: detected capacity change from 0 to 205544 May 15 10:38:36.996997 (sd-sysext)[1070]: Using extensions 'kubernetes'. May 15 10:38:36.997270 (sd-sysext)[1070]: Merged extensions into '/usr'. May 15 10:38:37.004781 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. May 15 10:38:37.011537 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:37.012654 systemd[1]: Mounting usr-share-oem.mount... May 15 10:38:37.013637 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:37.014658 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:37.016507 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:37.018134 systemd[1]: Starting modprobe@loop.service... May 15 10:38:37.018909 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:37.019013 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:37.019107 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:37.021234 systemd[1]: Mounted usr-share-oem.mount. May 15 10:38:37.022264 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:37.022360 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:37.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.023490 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:37.023590 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:37.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.024740 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:37.024977 systemd[1]: Finished modprobe@loop.service. May 15 10:38:37.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.025000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.026187 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:37.026274 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:37.027040 systemd[1]: Finished systemd-sysext.service. May 15 10:38:37.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.028660 systemd[1]: Starting ensure-sysext.service... May 15 10:38:37.030305 systemd[1]: Starting systemd-tmpfiles-setup.service... May 15 10:38:37.034252 systemd[1]: Reloading. May 15 10:38:37.041817 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. May 15 10:38:37.043638 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. May 15 10:38:37.046400 systemd-tmpfiles[1077]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. May 15 10:38:37.052372 ldconfig[1056]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. May 15 10:38:37.086684 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-05-15T10:38:37Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:37.086711 /usr/lib/systemd/system-generators/torcx-generator[1097]: time="2025-05-15T10:38:37Z" level=info msg="torcx already run" May 15 10:38:37.148384 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:37.148400 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:37.165372 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:37.215000 audit: BPF prog-id=27 op=LOAD May 15 10:38:37.215000 audit: BPF prog-id=23 op=UNLOAD May 15 10:38:37.217000 audit: BPF prog-id=28 op=LOAD May 15 10:38:37.217000 audit: BPF prog-id=24 op=UNLOAD May 15 10:38:37.217000 audit: BPF prog-id=29 op=LOAD May 15 10:38:37.217000 audit: BPF prog-id=30 op=LOAD May 15 10:38:37.217000 audit: BPF prog-id=25 op=UNLOAD May 15 10:38:37.217000 audit: BPF prog-id=26 op=UNLOAD May 15 10:38:37.218000 audit: BPF prog-id=31 op=LOAD May 15 10:38:37.218000 audit: BPF prog-id=18 op=UNLOAD May 15 10:38:37.218000 audit: BPF prog-id=32 op=LOAD May 15 10:38:37.218000 audit: BPF prog-id=33 op=LOAD May 15 10:38:37.218000 audit: BPF prog-id=19 op=UNLOAD May 15 10:38:37.219000 audit: BPF prog-id=20 op=UNLOAD May 15 10:38:37.219000 audit: BPF prog-id=34 op=LOAD May 15 10:38:37.219000 audit: BPF prog-id=35 op=LOAD May 15 10:38:37.219000 audit: BPF prog-id=21 op=UNLOAD May 15 10:38:37.219000 audit: BPF prog-id=22 op=UNLOAD May 15 10:38:37.222302 systemd[1]: Finished ldconfig.service. May 15 10:38:37.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.224145 systemd[1]: Finished systemd-tmpfiles-setup.service. May 15 10:38:37.224000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.228297 systemd[1]: Starting audit-rules.service... May 15 10:38:37.230105 systemd[1]: Starting clean-ca-certificates.service... May 15 10:38:37.232293 systemd[1]: Starting systemd-journal-catalog-update.service... May 15 10:38:37.233000 audit: BPF prog-id=36 op=LOAD May 15 10:38:37.236951 systemd[1]: Starting systemd-resolved.service... May 15 10:38:37.237000 audit: BPF prog-id=37 op=LOAD May 15 10:38:37.239397 systemd[1]: Starting systemd-timesyncd.service... May 15 10:38:37.241129 systemd[1]: Starting systemd-update-utmp.service... May 15 10:38:37.242349 systemd[1]: Finished clean-ca-certificates.service. May 15 10:38:37.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.245000 audit[1150]: SYSTEM_BOOT pid=1150 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' May 15 10:38:37.249217 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:37.249450 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:37.250618 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:37.252761 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:37.254521 systemd[1]: Starting modprobe@loop.service... May 15 10:38:37.255269 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:37.255426 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:37.255577 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:38:37.255697 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:37.257189 systemd[1]: Finished systemd-journal-catalog-update.service. May 15 10:38:37.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.258621 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:37.258732 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:37.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.259000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:37.260095 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:37.260196 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:37.261182 augenrules[1161]: No rules May 15 10:38:37.261622 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:37.260000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 May 15 10:38:37.260000 audit[1161]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd3b5346c0 a2=420 a3=0 items=0 ppid=1138 pid=1161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:37.260000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 May 15 10:38:37.261791 systemd[1]: Finished modprobe@loop.service. May 15 10:38:37.263108 systemd[1]: Finished audit-rules.service. May 15 10:38:37.267471 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:37.267716 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. May 15 10:38:37.269648 systemd[1]: Starting modprobe@dm_mod.service... May 15 10:38:37.271290 systemd[1]: Starting modprobe@drm.service... May 15 10:38:37.272988 systemd[1]: Starting modprobe@efi_pstore.service... May 15 10:38:37.274669 systemd[1]: Starting modprobe@loop.service... May 15 10:38:37.275505 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. May 15 10:38:37.275624 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:37.276667 systemd[1]: Starting systemd-networkd-wait-online.service... May 15 10:38:37.278703 systemd[1]: Starting systemd-update-done.service... May 15 10:38:37.279543 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). May 15 10:38:37.279629 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). May 15 10:38:37.280961 systemd[1]: Finished systemd-update-utmp.service. May 15 10:38:37.282167 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. May 15 10:38:37.282311 systemd[1]: Finished modprobe@dm_mod.service. May 15 10:38:37.284268 systemd[1]: modprobe@drm.service: Deactivated successfully. May 15 10:38:37.284390 systemd[1]: Finished modprobe@drm.service. May 15 10:38:37.285566 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. May 15 10:38:37.285677 systemd[1]: Finished modprobe@efi_pstore.service. May 15 10:38:37.286865 systemd[1]: modprobe@loop.service: Deactivated successfully. May 15 10:38:37.286975 systemd[1]: Finished modprobe@loop.service. May 15 10:38:37.288123 systemd[1]: Finished systemd-update-done.service. May 15 10:38:37.290447 systemd[1]: Finished ensure-sysext.service. May 15 10:38:37.292314 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). May 15 10:38:37.292351 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. May 15 10:38:37.305251 systemd-resolved[1147]: Positive Trust Anchors: May 15 10:38:37.305263 systemd-resolved[1147]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d May 15 10:38:37.305289 systemd-resolved[1147]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test May 15 10:38:37.311428 systemd[1]: Started systemd-timesyncd.service. May 15 10:38:37.311701 systemd-resolved[1147]: Defaulting to hostname 'linux'. May 15 10:38:37.312381 systemd[1]: Reached target time-set.target. May 15 10:38:37.313338 systemd[1]: Started systemd-resolved.service. May 15 10:38:37.314330 systemd[1]: Reached target network.target. May 15 10:38:37.315128 systemd[1]: Reached target nss-lookup.target. May 15 10:38:37.315951 systemd[1]: Reached target sysinit.target. May 15 10:38:37.316706 systemd-timesyncd[1148]: Contacted time server 10.0.0.1:123 (10.0.0.1). May 15 10:38:37.316753 systemd-timesyncd[1148]: Initial clock synchronization to Thu 2025-05-15 10:38:37.540252 UTC. May 15 10:38:37.316792 systemd[1]: Started motdgen.path. May 15 10:38:37.317494 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. May 15 10:38:37.318715 systemd[1]: Started logrotate.timer. May 15 10:38:37.319483 systemd[1]: Started mdadm.timer. May 15 10:38:37.320169 systemd[1]: Started systemd-tmpfiles-clean.timer. May 15 10:38:37.321017 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). May 15 10:38:37.321038 systemd[1]: Reached target paths.target. May 15 10:38:37.321772 systemd[1]: Reached target timers.target. May 15 10:38:37.322749 systemd[1]: Listening on dbus.socket. May 15 10:38:37.324304 systemd[1]: Starting docker.socket... May 15 10:38:37.326959 systemd[1]: Listening on sshd.socket. May 15 10:38:37.327814 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:37.328142 systemd[1]: Listening on docker.socket. May 15 10:38:37.328949 systemd[1]: Reached target sockets.target. May 15 10:38:37.329739 systemd[1]: Reached target basic.target. May 15 10:38:37.330503 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:38:37.330546 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. May 15 10:38:37.331322 systemd[1]: Starting containerd.service... May 15 10:38:37.332856 systemd[1]: Starting dbus.service... May 15 10:38:37.334430 systemd[1]: Starting enable-oem-cloudinit.service... May 15 10:38:37.336238 systemd[1]: Starting extend-filesystems.service... May 15 10:38:37.337189 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). May 15 10:38:37.338140 systemd[1]: Starting motdgen.service... May 15 10:38:37.339578 jq[1177]: false May 15 10:38:37.339994 systemd[1]: Starting prepare-helm.service... May 15 10:38:37.342038 systemd[1]: Starting ssh-key-proc-cmdline.service... May 15 10:38:37.343851 systemd[1]: Starting sshd-keygen.service... May 15 10:38:37.346698 systemd[1]: Starting systemd-logind.service... May 15 10:38:37.347558 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). May 15 10:38:37.347618 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). May 15 10:38:37.347931 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. May 15 10:38:37.348460 systemd[1]: Starting update-engine.service... May 15 10:38:37.350163 systemd[1]: Starting update-ssh-keys-after-ignition.service... May 15 10:38:37.352464 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. May 15 10:38:37.357686 jq[1191]: true May 15 10:38:37.352631 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. May 15 10:38:37.353491 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. May 15 10:38:37.353623 systemd[1]: Finished ssh-key-proc-cmdline.service. May 15 10:38:37.359971 jq[1198]: true May 15 10:38:37.361910 systemd[1]: motdgen.service: Deactivated successfully. May 15 10:38:37.362052 systemd[1]: Finished motdgen.service. May 15 10:38:37.365429 tar[1196]: linux-amd64/helm May 15 10:38:37.366531 extend-filesystems[1178]: Found loop1 May 15 10:38:37.366531 extend-filesystems[1178]: Found sr0 May 15 10:38:37.366531 extend-filesystems[1178]: Found vda May 15 10:38:37.366531 extend-filesystems[1178]: Found vda1 May 15 10:38:37.366531 extend-filesystems[1178]: Found vda2 May 15 10:38:37.366531 extend-filesystems[1178]: Found vda3 May 15 10:38:37.366531 extend-filesystems[1178]: Found usr May 15 10:38:37.366531 extend-filesystems[1178]: Found vda4 May 15 10:38:37.366531 extend-filesystems[1178]: Found vda6 May 15 10:38:37.366531 extend-filesystems[1178]: Found vda7 May 15 10:38:37.366531 extend-filesystems[1178]: Found vda9 May 15 10:38:37.366531 extend-filesystems[1178]: Checking size of /dev/vda9 May 15 10:38:37.372515 dbus-daemon[1176]: [system] SELinux support is enabled May 15 10:38:37.372624 systemd[1]: Started dbus.service. May 15 10:38:37.375315 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). May 15 10:38:37.375332 systemd[1]: Reached target system-config.target. May 15 10:38:37.376360 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). May 15 10:38:37.376374 systemd[1]: Reached target user-config.target. May 15 10:38:37.391117 update_engine[1188]: I0515 10:38:37.389937 1188 main.cc:92] Flatcar Update Engine starting May 15 10:38:37.397971 update_engine[1188]: I0515 10:38:37.392827 1188 update_check_scheduler.cc:74] Next update check in 9m30s May 15 10:38:37.392676 systemd[1]: Started update-engine.service. May 15 10:38:37.394834 systemd[1]: Started locksmithd.service. May 15 10:38:37.399827 systemd-logind[1187]: Watching system buttons on /dev/input/event1 (Power Button) May 15 10:38:37.399846 systemd-logind[1187]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) May 15 10:38:37.401932 systemd-logind[1187]: New seat seat0. May 15 10:38:37.405636 env[1199]: time="2025-05-15T10:38:37.405567760Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 May 15 10:38:37.406220 extend-filesystems[1178]: Resized partition /dev/vda9 May 15 10:38:37.408169 extend-filesystems[1229]: resize2fs 1.46.5 (30-Dec-2021) May 15 10:38:37.410257 systemd[1]: Started systemd-logind.service. May 15 10:38:37.416494 bash[1224]: Updated "/home/core/.ssh/authorized_keys" May 15 10:38:37.416840 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks May 15 10:38:37.417171 systemd[1]: Finished update-ssh-keys-after-ignition.service. May 15 10:38:37.431815 kernel: EXT4-fs (vda9): resized filesystem to 1864699 May 15 10:38:37.434706 env[1199]: time="2025-05-15T10:38:37.434667984Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 May 15 10:38:37.449661 extend-filesystems[1229]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required May 15 10:38:37.449661 extend-filesystems[1229]: old_desc_blocks = 1, new_desc_blocks = 1 May 15 10:38:37.449661 extend-filesystems[1229]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. May 15 10:38:37.454768 extend-filesystems[1178]: Resized filesystem in /dev/vda9 May 15 10:38:37.450550 systemd[1]: extend-filesystems.service: Deactivated successfully. May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.450234873Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.451547645Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.182-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.451568845Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.451743292Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.451756417Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.451766325Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.451774561Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.451841767Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.452022015Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 May 15 10:38:37.455869 env[1199]: time="2025-05-15T10:38:37.452115430Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 May 15 10:38:37.450689 systemd[1]: Finished extend-filesystems.service. May 15 10:38:37.456123 env[1199]: time="2025-05-15T10:38:37.452127563Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 May 15 10:38:37.456123 env[1199]: time="2025-05-15T10:38:37.452164422Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" May 15 10:38:37.456123 env[1199]: time="2025-05-15T10:38:37.452176875Z" level=info msg="metadata content store policy set" policy=shared May 15 10:38:37.458747 env[1199]: time="2025-05-15T10:38:37.458721722Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 May 15 10:38:37.458790 env[1199]: time="2025-05-15T10:38:37.458749995Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 May 15 10:38:37.458790 env[1199]: time="2025-05-15T10:38:37.458762518Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 May 15 10:38:37.458790 env[1199]: time="2025-05-15T10:38:37.458787245Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 May 15 10:38:37.458883 env[1199]: time="2025-05-15T10:38:37.458809937Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 May 15 10:38:37.458883 env[1199]: time="2025-05-15T10:38:37.458823863Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 May 15 10:38:37.458883 env[1199]: time="2025-05-15T10:38:37.458836196Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 May 15 10:38:37.458883 env[1199]: time="2025-05-15T10:38:37.458848419Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 May 15 10:38:37.458883 env[1199]: time="2025-05-15T10:38:37.458860442Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 May 15 10:38:37.458883 env[1199]: time="2025-05-15T10:38:37.458872304Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 May 15 10:38:37.458883 env[1199]: time="2025-05-15T10:38:37.458883695Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 May 15 10:38:37.459043 env[1199]: time="2025-05-15T10:38:37.458895828Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 May 15 10:38:37.459043 env[1199]: time="2025-05-15T10:38:37.458970939Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 May 15 10:38:37.459043 env[1199]: time="2025-05-15T10:38:37.459029619Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 May 15 10:38:37.459236 env[1199]: time="2025-05-15T10:38:37.459211971Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 May 15 10:38:37.459276 env[1199]: time="2025-05-15T10:38:37.459239753Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459276 env[1199]: time="2025-05-15T10:38:37.459252547Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 May 15 10:38:37.459321 env[1199]: time="2025-05-15T10:38:37.459289867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459321 env[1199]: time="2025-05-15T10:38:37.459301229Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459321 env[1199]: time="2025-05-15T10:38:37.459312660Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459377 env[1199]: time="2025-05-15T10:38:37.459322328Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459377 env[1199]: time="2025-05-15T10:38:37.459333329Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459377 env[1199]: time="2025-05-15T10:38:37.459345121Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459377 env[1199]: time="2025-05-15T10:38:37.459355430Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459377 env[1199]: time="2025-05-15T10:38:37.459365870Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459377 env[1199]: time="2025-05-15T10:38:37.459377361Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 May 15 10:38:37.459494 env[1199]: time="2025-05-15T10:38:37.459467310Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459494 env[1199]: time="2025-05-15T10:38:37.459480405Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459494 env[1199]: time="2025-05-15T10:38:37.459490554Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459566 env[1199]: time="2025-05-15T10:38:37.459519107Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 May 15 10:38:37.459566 env[1199]: time="2025-05-15T10:38:37.459531911Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 May 15 10:38:37.459566 env[1199]: time="2025-05-15T10:38:37.459541189Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 May 15 10:38:37.459566 env[1199]: time="2025-05-15T10:38:37.459561687Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" May 15 10:38:37.459640 env[1199]: time="2025-05-15T10:38:37.459591964Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 May 15 10:38:37.459827 env[1199]: time="2025-05-15T10:38:37.459756673Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" May 15 10:38:37.460346 env[1199]: time="2025-05-15T10:38:37.459858294Z" level=info msg="Connect containerd service" May 15 10:38:37.460346 env[1199]: time="2025-05-15T10:38:37.459885625Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" May 15 10:38:37.460346 env[1199]: time="2025-05-15T10:38:37.460320030Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:38:37.460518 env[1199]: time="2025-05-15T10:38:37.460485660Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc May 15 10:38:37.460564 env[1199]: time="2025-05-15T10:38:37.460531326Z" level=info msg=serving... address=/run/containerd/containerd.sock May 15 10:38:37.460587 env[1199]: time="2025-05-15T10:38:37.460569558Z" level=info msg="containerd successfully booted in 0.055622s" May 15 10:38:37.460627 systemd[1]: Started containerd.service. May 15 10:38:37.465148 env[1199]: time="2025-05-15T10:38:37.465081942Z" level=info msg="Start subscribing containerd event" May 15 10:38:37.465191 env[1199]: time="2025-05-15T10:38:37.465177341Z" level=info msg="Start recovering state" May 15 10:38:37.465274 env[1199]: time="2025-05-15T10:38:37.465253624Z" level=info msg="Start event monitor" May 15 10:38:37.465314 env[1199]: time="2025-05-15T10:38:37.465281175Z" level=info msg="Start snapshots syncer" May 15 10:38:37.465314 env[1199]: time="2025-05-15T10:38:37.465293699Z" level=info msg="Start cni network conf syncer for default" May 15 10:38:37.465314 env[1199]: time="2025-05-15T10:38:37.465300692Z" level=info msg="Start streaming server" May 15 10:38:37.470442 locksmithd[1227]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" May 15 10:38:37.738490 tar[1196]: linux-amd64/LICENSE May 15 10:38:37.738652 tar[1196]: linux-amd64/README.md May 15 10:38:37.742774 systemd[1]: Finished prepare-helm.service. May 15 10:38:37.959917 systemd-networkd[1025]: eth0: Gained IPv6LL May 15 10:38:37.961731 systemd[1]: Finished systemd-networkd-wait-online.service. May 15 10:38:37.962980 systemd[1]: Reached target network-online.target. May 15 10:38:37.965185 systemd[1]: Starting kubelet.service... May 15 10:38:38.459657 sshd_keygen[1201]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 May 15 10:38:38.477800 systemd[1]: Finished sshd-keygen.service. May 15 10:38:38.480107 systemd[1]: Starting issuegen.service... May 15 10:38:38.485859 systemd[1]: issuegen.service: Deactivated successfully. May 15 10:38:38.486027 systemd[1]: Finished issuegen.service. May 15 10:38:38.488268 systemd[1]: Starting systemd-user-sessions.service... May 15 10:38:38.493665 systemd[1]: Finished systemd-user-sessions.service. May 15 10:38:38.495949 systemd[1]: Started getty@tty1.service. May 15 10:38:38.497802 systemd[1]: Started serial-getty@ttyS0.service. May 15 10:38:38.498991 systemd[1]: Reached target getty.target. May 15 10:38:38.516301 systemd[1]: Started kubelet.service. May 15 10:38:38.517928 systemd[1]: Reached target multi-user.target. May 15 10:38:38.520319 systemd[1]: Starting systemd-update-utmp-runlevel.service... May 15 10:38:38.527495 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. May 15 10:38:38.527634 systemd[1]: Finished systemd-update-utmp-runlevel.service. May 15 10:38:38.528913 systemd[1]: Startup finished in 582ms (kernel) + 4.864s (initrd) + 4.979s (userspace) = 10.426s. May 15 10:38:38.905763 kubelet[1257]: E0515 10:38:38.905636 1257 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:38:38.907495 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:38:38.907616 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:38:41.139318 systemd[1]: Created slice system-sshd.slice. May 15 10:38:41.140307 systemd[1]: Started sshd@0-10.0.0.55:22-10.0.0.1:52224.service. May 15 10:38:41.173999 sshd[1267]: Accepted publickey for core from 10.0.0.1 port 52224 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:41.175745 sshd[1267]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:41.183298 systemd[1]: Created slice user-500.slice. May 15 10:38:41.184328 systemd[1]: Starting user-runtime-dir@500.service... May 15 10:38:41.185765 systemd-logind[1187]: New session 1 of user core. May 15 10:38:41.192992 systemd[1]: Finished user-runtime-dir@500.service. May 15 10:38:41.194478 systemd[1]: Starting user@500.service... May 15 10:38:41.197011 (systemd)[1270]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:41.265105 systemd[1270]: Queued start job for default target default.target. May 15 10:38:41.265530 systemd[1270]: Reached target paths.target. May 15 10:38:41.265550 systemd[1270]: Reached target sockets.target. May 15 10:38:41.265561 systemd[1270]: Reached target timers.target. May 15 10:38:41.265572 systemd[1270]: Reached target basic.target. May 15 10:38:41.265606 systemd[1270]: Reached target default.target. May 15 10:38:41.265627 systemd[1270]: Startup finished in 63ms. May 15 10:38:41.265689 systemd[1]: Started user@500.service. May 15 10:38:41.266545 systemd[1]: Started session-1.scope. May 15 10:38:41.317278 systemd[1]: Started sshd@1-10.0.0.55:22-10.0.0.1:52240.service. May 15 10:38:41.349908 sshd[1279]: Accepted publickey for core from 10.0.0.1 port 52240 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:41.351076 sshd[1279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:41.355459 systemd-logind[1187]: New session 2 of user core. May 15 10:38:41.356497 systemd[1]: Started session-2.scope. May 15 10:38:41.409624 sshd[1279]: pam_unix(sshd:session): session closed for user core May 15 10:38:41.412045 systemd[1]: sshd@1-10.0.0.55:22-10.0.0.1:52240.service: Deactivated successfully. May 15 10:38:41.412532 systemd[1]: session-2.scope: Deactivated successfully. May 15 10:38:41.413015 systemd-logind[1187]: Session 2 logged out. Waiting for processes to exit. May 15 10:38:41.413798 systemd[1]: Started sshd@2-10.0.0.55:22-10.0.0.1:52252.service. May 15 10:38:41.414416 systemd-logind[1187]: Removed session 2. May 15 10:38:41.443897 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 52252 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:41.444861 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:41.447984 systemd-logind[1187]: New session 3 of user core. May 15 10:38:41.448708 systemd[1]: Started session-3.scope. May 15 10:38:41.497255 sshd[1285]: pam_unix(sshd:session): session closed for user core May 15 10:38:41.499736 systemd[1]: sshd@2-10.0.0.55:22-10.0.0.1:52252.service: Deactivated successfully. May 15 10:38:41.500219 systemd[1]: session-3.scope: Deactivated successfully. May 15 10:38:41.500686 systemd-logind[1187]: Session 3 logged out. Waiting for processes to exit. May 15 10:38:41.501590 systemd[1]: Started sshd@3-10.0.0.55:22-10.0.0.1:52262.service. May 15 10:38:41.502260 systemd-logind[1187]: Removed session 3. May 15 10:38:41.532016 sshd[1291]: Accepted publickey for core from 10.0.0.1 port 52262 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:41.532987 sshd[1291]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:41.535768 systemd-logind[1187]: New session 4 of user core. May 15 10:38:41.536480 systemd[1]: Started session-4.scope. May 15 10:38:41.590639 sshd[1291]: pam_unix(sshd:session): session closed for user core May 15 10:38:41.593877 systemd[1]: Started sshd@4-10.0.0.55:22-10.0.0.1:52270.service. May 15 10:38:41.594409 systemd[1]: sshd@3-10.0.0.55:22-10.0.0.1:52262.service: Deactivated successfully. May 15 10:38:41.594974 systemd[1]: session-4.scope: Deactivated successfully. May 15 10:38:41.595529 systemd-logind[1187]: Session 4 logged out. Waiting for processes to exit. May 15 10:38:41.596353 systemd-logind[1187]: Removed session 4. May 15 10:38:41.624320 sshd[1296]: Accepted publickey for core from 10.0.0.1 port 52270 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:41.625264 sshd[1296]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:41.628264 systemd-logind[1187]: New session 5 of user core. May 15 10:38:41.628968 systemd[1]: Started session-5.scope. May 15 10:38:41.683598 sudo[1300]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 May 15 10:38:41.683800 sudo[1300]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:41.693039 dbus-daemon[1176]: \xd0M\xa1\xa7UU: received setenforce notice (enforcing=-19522752) May 15 10:38:41.695082 sudo[1300]: pam_unix(sudo:session): session closed for user root May 15 10:38:41.696511 sshd[1296]: pam_unix(sshd:session): session closed for user core May 15 10:38:41.699276 systemd[1]: sshd@4-10.0.0.55:22-10.0.0.1:52270.service: Deactivated successfully. May 15 10:38:41.699751 systemd[1]: session-5.scope: Deactivated successfully. May 15 10:38:41.700263 systemd-logind[1187]: Session 5 logged out. Waiting for processes to exit. May 15 10:38:41.701177 systemd[1]: Started sshd@5-10.0.0.55:22-10.0.0.1:52274.service. May 15 10:38:41.701750 systemd-logind[1187]: Removed session 5. May 15 10:38:41.731103 sshd[1304]: Accepted publickey for core from 10.0.0.1 port 52274 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:41.732096 sshd[1304]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:41.735221 systemd-logind[1187]: New session 6 of user core. May 15 10:38:41.735983 systemd[1]: Started session-6.scope. May 15 10:38:41.787653 sudo[1308]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules May 15 10:38:41.787864 sudo[1308]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:41.790103 sudo[1308]: pam_unix(sudo:session): session closed for user root May 15 10:38:41.793892 sudo[1307]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules May 15 10:38:41.794060 sudo[1307]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:41.801934 systemd[1]: Stopping audit-rules.service... May 15 10:38:41.802000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:38:41.803874 kernel: kauditd_printk_skb: 269 callbacks suppressed May 15 10:38:41.803905 kernel: audit: type=1305 audit(1747305521.802:190): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 May 15 10:38:41.803966 auditctl[1311]: No rules May 15 10:38:41.804207 systemd[1]: audit-rules.service: Deactivated successfully. May 15 10:38:41.804337 systemd[1]: Stopped audit-rules.service. May 15 10:38:41.805594 systemd[1]: Starting audit-rules.service... May 15 10:38:41.810271 kernel: audit: type=1300 audit(1747305521.802:190): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca1bd7ae0 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:41.802000 audit[1311]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffca1bd7ae0 a2=420 a3=0 items=0 ppid=1 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:41.811748 kernel: audit: type=1327 audit(1747305521.802:190): proctitle=2F7362696E2F617564697463746C002D44 May 15 10:38:41.802000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 May 15 10:38:41.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.815834 kernel: audit: type=1131 audit(1747305521.803:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.820378 augenrules[1328]: No rules May 15 10:38:41.820929 systemd[1]: Finished audit-rules.service. May 15 10:38:41.821737 sudo[1307]: pam_unix(sudo:session): session closed for user root May 15 10:38:41.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.822934 sshd[1304]: pam_unix(sshd:session): session closed for user core May 15 10:38:41.819000 audit[1307]: USER_END pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:41.828053 systemd[1]: Started sshd@6-10.0.0.55:22-10.0.0.1:52284.service. May 15 10:38:41.828507 systemd[1]: sshd@5-10.0.0.55:22-10.0.0.1:52274.service: Deactivated successfully. May 15 10:38:41.828675 kernel: audit: type=1130 audit(1747305521.819:192): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.828710 kernel: audit: type=1106 audit(1747305521.819:193): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:41.828734 kernel: audit: type=1104 audit(1747305521.820:194): pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:41.820000 audit[1307]: CRED_DISP pid=1307 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:41.829009 systemd[1]: session-6.scope: Deactivated successfully. May 15 10:38:41.829681 systemd-logind[1187]: Session 6 logged out. Waiting for processes to exit. May 15 10:38:41.830586 systemd-logind[1187]: Removed session 6. May 15 10:38:41.824000 audit[1304]: USER_END pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:41.836309 kernel: audit: type=1106 audit(1747305521.824:195): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:41.836399 kernel: audit: type=1104 audit(1747305521.824:196): pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:41.824000 audit[1304]: CRED_DISP pid=1304 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:41.839663 kernel: audit: type=1130 audit(1747305521.824:197): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.55:22-10.0.0.1:52284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.824000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.55:22-10.0.0.1:52284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.827000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.55:22-10.0.0.1:52274 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:41.861000 audit[1333]: USER_ACCT pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:41.862232 sshd[1333]: Accepted publickey for core from 10.0.0.1 port 52284 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:38:41.862000 audit[1333]: CRED_ACQ pid=1333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:41.862000 audit[1333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd09121c40 a2=3 a3=0 items=0 ppid=1 pid=1333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:41.862000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:38:41.863315 sshd[1333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:38:41.866481 systemd-logind[1187]: New session 7 of user core. May 15 10:38:41.867242 systemd[1]: Started session-7.scope. May 15 10:38:41.869000 audit[1333]: USER_START pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:41.870000 audit[1336]: CRED_ACQ pid=1336 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:38:41.917000 audit[1337]: USER_ACCT pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:41.918395 sudo[1337]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh May 15 10:38:41.917000 audit[1337]: CRED_REFR pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:41.918582 sudo[1337]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) May 15 10:38:41.919000 audit[1337]: USER_START pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:38:41.936592 systemd[1]: Starting docker.service... May 15 10:38:41.969669 env[1348]: time="2025-05-15T10:38:41.969624376Z" level=info msg="Starting up" May 15 10:38:41.971393 env[1348]: time="2025-05-15T10:38:41.971354207Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:38:41.971393 env[1348]: time="2025-05-15T10:38:41.971385055Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:38:41.971458 env[1348]: time="2025-05-15T10:38:41.971412768Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:38:41.971458 env[1348]: time="2025-05-15T10:38:41.971428794Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:38:41.973091 env[1348]: time="2025-05-15T10:38:41.973059794Z" level=info msg="parsed scheme: \"unix\"" module=grpc May 15 10:38:41.973091 env[1348]: time="2025-05-15T10:38:41.973083170Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc May 15 10:38:41.973157 env[1348]: time="2025-05-15T10:38:41.973099584Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc May 15 10:38:41.973157 env[1348]: time="2025-05-15T10:38:41.973119581Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc May 15 10:38:42.478817 env[1348]: time="2025-05-15T10:38:42.478763418Z" level=info msg="Loading containers: start." May 15 10:38:42.528000 audit[1382]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1382 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.528000 audit[1382]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd07d46740 a2=0 a3=7ffd07d4672c items=0 ppid=1348 pid=1382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.528000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 May 15 10:38:42.529000 audit[1384]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1384 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.529000 audit[1384]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7fff4096a7c0 a2=0 a3=7fff4096a7ac items=0 ppid=1348 pid=1384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.529000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 May 15 10:38:42.531000 audit[1386]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1386 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.531000 audit[1386]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffffdddd580 a2=0 a3=7ffffdddd56c items=0 ppid=1348 pid=1386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:38:42.531000 audit[1388]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1388 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.531000 audit[1388]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffbb7262e0 a2=0 a3=7fffbb7262cc items=0 ppid=1348 pid=1388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.531000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:38:42.533000 audit[1390]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1390 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.533000 audit[1390]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffebebdccc0 a2=0 a3=7ffebebdccac items=0 ppid=1348 pid=1390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.533000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E May 15 10:38:42.549000 audit[1395]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1395 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.549000 audit[1395]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd05334400 a2=0 a3=7ffd053343ec items=0 ppid=1348 pid=1395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.549000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E May 15 10:38:42.557000 audit[1397]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1397 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.557000 audit[1397]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc1a054110 a2=0 a3=7ffc1a0540fc items=0 ppid=1348 pid=1397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.557000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 May 15 10:38:42.559000 audit[1399]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1399 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.559000 audit[1399]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffd7a0d64d0 a2=0 a3=7ffd7a0d64bc items=0 ppid=1348 pid=1399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.559000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E May 15 10:38:42.560000 audit[1401]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.560000 audit[1401]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffe6b408ac0 a2=0 a3=7ffe6b408aac items=0 ppid=1348 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.560000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:42.568000 audit[1405]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.568000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffc99278180 a2=0 a3=7ffc9927816c items=0 ppid=1348 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.568000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:42.575000 audit[1406]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1406 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.575000 audit[1406]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffde87d3380 a2=0 a3=7ffde87d336c items=0 ppid=1348 pid=1406 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.575000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:42.584836 kernel: Initializing XFRM netlink socket May 15 10:38:42.611017 env[1348]: time="2025-05-15T10:38:42.610966916Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" May 15 10:38:42.625000 audit[1414]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.625000 audit[1414]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffdbbff5490 a2=0 a3=7ffdbbff547c items=0 ppid=1348 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.625000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 May 15 10:38:42.634000 audit[1417]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1417 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.634000 audit[1417]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fffa475ac00 a2=0 a3=7fffa475abec items=0 ppid=1348 pid=1417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.634000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E May 15 10:38:42.636000 audit[1420]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.636000 audit[1420]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffccbfaa2b0 a2=0 a3=7ffccbfaa29c items=0 ppid=1348 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.636000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 May 15 10:38:42.638000 audit[1422]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1422 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.638000 audit[1422]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff23339500 a2=0 a3=7fff233394ec items=0 ppid=1348 pid=1422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.638000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 May 15 10:38:42.639000 audit[1424]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.639000 audit[1424]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffe28f54de0 a2=0 a3=7ffe28f54dcc items=0 ppid=1348 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.639000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 May 15 10:38:42.641000 audit[1426]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1426 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.641000 audit[1426]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffcf2a16bd0 a2=0 a3=7ffcf2a16bbc items=0 ppid=1348 pid=1426 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.641000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 May 15 10:38:42.643000 audit[1428]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1428 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.643000 audit[1428]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffdffeec680 a2=0 a3=7ffdffeec66c items=0 ppid=1348 pid=1428 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.643000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 May 15 10:38:42.649000 audit[1431]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1431 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.649000 audit[1431]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffecb2109c0 a2=0 a3=7ffecb2109ac items=0 ppid=1348 pid=1431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.649000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 May 15 10:38:42.651000 audit[1433]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.651000 audit[1433]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffe9d81dac0 a2=0 a3=7ffe9d81daac items=0 ppid=1348 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.651000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 May 15 10:38:42.652000 audit[1435]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1435 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.652000 audit[1435]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe37bce420 a2=0 a3=7ffe37bce40c items=0 ppid=1348 pid=1435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.652000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 May 15 10:38:42.654000 audit[1437]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1437 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.654000 audit[1437]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffeb35926f0 a2=0 a3=7ffeb35926dc items=0 ppid=1348 pid=1437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.654000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 May 15 10:38:42.655494 systemd-networkd[1025]: docker0: Link UP May 15 10:38:42.661000 audit[1441]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.661000 audit[1441]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd69d89d00 a2=0 a3=7ffd69d89cec items=0 ppid=1348 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.661000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:42.668000 audit[1442]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1442 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:42.668000 audit[1442]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe4948d090 a2=0 a3=7ffe4948d07c items=0 ppid=1348 pid=1442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:42.668000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 May 15 10:38:42.669807 env[1348]: time="2025-05-15T10:38:42.669775036Z" level=info msg="Loading containers: done." May 15 10:38:42.682186 env[1348]: time="2025-05-15T10:38:42.682143424Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 May 15 10:38:42.682313 env[1348]: time="2025-05-15T10:38:42.682298547Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 May 15 10:38:42.682396 env[1348]: time="2025-05-15T10:38:42.682373379Z" level=info msg="Daemon has completed initialization" May 15 10:38:42.698745 systemd[1]: Started docker.service. May 15 10:38:42.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:42.702694 env[1348]: time="2025-05-15T10:38:42.702643471Z" level=info msg="API listen on /run/docker.sock" May 15 10:38:43.339667 env[1199]: time="2025-05-15T10:38:43.339615057Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\"" May 15 10:38:44.165687 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3146382437.mount: Deactivated successfully. May 15 10:38:45.571133 env[1199]: time="2025-05-15T10:38:45.571066731Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.572997 env[1199]: time="2025-05-15T10:38:45.572968768Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.574864 env[1199]: time="2025-05-15T10:38:45.574841704Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.576383 env[1199]: time="2025-05-15T10:38:45.576352732Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:30090db6a7d53799163ce82dae9e8ddb645fd47db93f2ec9da0cc787fd825625,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:45.577095 env[1199]: time="2025-05-15T10:38:45.577059731Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.8\" returns image reference \"sha256:e6d208e868a9ca7f89efcb0d5bddc55a62df551cb4fb39c5099a2fe7b0e33adc\"" May 15 10:38:45.578565 env[1199]: time="2025-05-15T10:38:45.578521681Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\"" May 15 10:38:47.067075 env[1199]: time="2025-05-15T10:38:47.067016241Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:47.069003 env[1199]: time="2025-05-15T10:38:47.068951920Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:47.070637 env[1199]: time="2025-05-15T10:38:47.070608065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:47.072206 env[1199]: time="2025-05-15T10:38:47.072162244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:29eaddc64792a689df48506e78bbc641d063ac8bb92d2e66ae2ad05977420747,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:47.072896 env[1199]: time="2025-05-15T10:38:47.072865775Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.8\" returns image reference \"sha256:fbda0bc3bc4bb93c8b2d8627a9aa8d945c200b51e48c88f9b837dde628fc7c8f\"" May 15 10:38:47.073421 env[1199]: time="2025-05-15T10:38:47.073400577Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\"" May 15 10:38:48.838900 env[1199]: time="2025-05-15T10:38:48.838834469Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:48.840713 env[1199]: time="2025-05-15T10:38:48.840660356Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:48.842348 env[1199]: time="2025-05-15T10:38:48.842307012Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:48.844037 env[1199]: time="2025-05-15T10:38:48.843991678Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:22994a2632e81059720480b9f6bdeb133b08d58492d0b36dfd6e9768b159b22a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:48.844607 env[1199]: time="2025-05-15T10:38:48.844575798Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.8\" returns image reference \"sha256:2a9c646db0be37003c2b50605a252f7139145411d9e4e0badd8ae07f56ce5eb8\"" May 15 10:38:48.845112 env[1199]: time="2025-05-15T10:38:48.845077499Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\"" May 15 10:38:49.002789 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. May 15 10:38:49.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.002971 systemd[1]: Stopped kubelet.service. May 15 10:38:49.004175 systemd[1]: Starting kubelet.service... May 15 10:38:49.006831 kernel: kauditd_printk_skb: 84 callbacks suppressed May 15 10:38:49.006878 kernel: audit: type=1130 audit(1747305529.002:232): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.006899 kernel: audit: type=1131 audit(1747305529.002:233): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.091331 systemd[1]: Started kubelet.service. May 15 10:38:49.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.094832 kernel: audit: type=1130 audit(1747305529.089:234): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:49.326079 kubelet[1484]: E0515 10:38:49.326018 1484 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" May 15 10:38:49.328968 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE May 15 10:38:49.329087 systemd[1]: kubelet.service: Failed with result 'exit-code'. May 15 10:38:49.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:49.332831 kernel: audit: type=1131 audit(1747305529.328:235): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' May 15 10:38:50.054026 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount394666773.mount: Deactivated successfully. May 15 10:38:50.655308 env[1199]: time="2025-05-15T10:38:50.655234615Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:50.657129 env[1199]: time="2025-05-15T10:38:50.657092582Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:50.658657 env[1199]: time="2025-05-15T10:38:50.658610589Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:50.660249 env[1199]: time="2025-05-15T10:38:50.660205069Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:dd0c9a37670f209947b1ed880f06a2e93e1d41da78c037f52f94b13858769838,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:50.660605 env[1199]: time="2025-05-15T10:38:50.660575759Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.8\" returns image reference \"sha256:7d73f013cedcf301aef42272c93e4c1174dab1a8eccd96840091ef04b63480f2\"" May 15 10:38:50.661137 env[1199]: time="2025-05-15T10:38:50.661107619Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" May 15 10:38:51.316933 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1798377337.mount: Deactivated successfully. May 15 10:38:52.318458 env[1199]: time="2025-05-15T10:38:52.318392879Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.320262 env[1199]: time="2025-05-15T10:38:52.320231567Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.322174 env[1199]: time="2025-05-15T10:38:52.322129523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.323818 env[1199]: time="2025-05-15T10:38:52.323768133Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.324600 env[1199]: time="2025-05-15T10:38:52.324565386Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" May 15 10:38:52.325144 env[1199]: time="2025-05-15T10:38:52.325098264Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" May 15 10:38:52.753561 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2040255955.mount: Deactivated successfully. May 15 10:38:52.758942 env[1199]: time="2025-05-15T10:38:52.758888372Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.760581 env[1199]: time="2025-05-15T10:38:52.760533965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.762130 env[1199]: time="2025-05-15T10:38:52.762091343Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.763377 env[1199]: time="2025-05-15T10:38:52.763339597Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:52.763766 env[1199]: time="2025-05-15T10:38:52.763737610Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" May 15 10:38:52.764233 env[1199]: time="2025-05-15T10:38:52.764201802Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" May 15 10:38:53.217129 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3963475526.mount: Deactivated successfully. May 15 10:38:56.135329 env[1199]: time="2025-05-15T10:38:56.135258202Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:56.137075 env[1199]: time="2025-05-15T10:38:56.137045873Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:56.138765 env[1199]: time="2025-05-15T10:38:56.138734627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:56.140899 env[1199]: time="2025-05-15T10:38:56.140847712Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:38:56.141942 env[1199]: time="2025-05-15T10:38:56.141899077Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" May 15 10:38:58.234590 systemd[1]: Stopped kubelet.service. May 15 10:38:58.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.238131 systemd[1]: Starting kubelet.service... May 15 10:38:58.240864 kernel: audit: type=1130 audit(1747305538.232:236): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.240921 kernel: audit: type=1131 audit(1747305538.234:237): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:58.259549 systemd[1]: Reloading. May 15 10:38:58.328662 /usr/lib/systemd/system-generators/torcx-generator[1537]: time="2025-05-15T10:38:58Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:38:58.329054 /usr/lib/systemd/system-generators/torcx-generator[1537]: time="2025-05-15T10:38:58Z" level=info msg="torcx already run" May 15 10:38:59.109757 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:38:59.109775 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:38:59.126615 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:38:59.196040 kernel: audit: type=1400 audit(1747305539.183:238): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.196103 kernel: audit: type=1400 audit(1747305539.183:239): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.199057 kernel: audit: type=1400 audit(1747305539.183:240): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.199119 kernel: audit: type=1400 audit(1747305539.183:241): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201917 kernel: audit: type=1400 audit(1747305539.183:242): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.204822 kernel: audit: type=1400 audit(1747305539.183:243): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.207668 kernel: audit: type=1400 audit(1747305539.183:244): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213393 kernel: audit: type=1400 audit(1747305539.183:245): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.195000 audit: BPF prog-id=43 op=LOAD May 15 10:38:59.195000 audit: BPF prog-id=27 op=UNLOAD May 15 10:38:59.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit: BPF prog-id=44 op=LOAD May 15 10:38:59.201000 audit: BPF prog-id=38 op=UNLOAD May 15 10:38:59.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.201000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit: BPF prog-id=45 op=LOAD May 15 10:38:59.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.212000 audit: BPF prog-id=46 op=LOAD May 15 10:38:59.212000 audit: BPF prog-id=39 op=UNLOAD May 15 10:38:59.212000 audit: BPF prog-id=40 op=UNLOAD May 15 10:38:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit: BPF prog-id=47 op=LOAD May 15 10:38:59.214000 audit: BPF prog-id=28 op=UNLOAD May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit: BPF prog-id=48 op=LOAD May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.214000 audit: BPF prog-id=49 op=LOAD May 15 10:38:59.214000 audit: BPF prog-id=29 op=UNLOAD May 15 10:38:59.214000 audit: BPF prog-id=30 op=UNLOAD May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit: BPF prog-id=50 op=LOAD May 15 10:38:59.215000 audit: BPF prog-id=41 op=UNLOAD May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.215000 audit: BPF prog-id=51 op=LOAD May 15 10:38:59.215000 audit: BPF prog-id=31 op=UNLOAD May 15 10:38:59.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit: BPF prog-id=52 op=LOAD May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit: BPF prog-id=53 op=LOAD May 15 10:38:59.216000 audit: BPF prog-id=32 op=UNLOAD May 15 10:38:59.216000 audit: BPF prog-id=33 op=UNLOAD May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit: BPF prog-id=54 op=LOAD May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.216000 audit: BPF prog-id=55 op=LOAD May 15 10:38:59.216000 audit: BPF prog-id=34 op=UNLOAD May 15 10:38:59.216000 audit: BPF prog-id=35 op=UNLOAD May 15 10:38:59.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.217000 audit: BPF prog-id=56 op=LOAD May 15 10:38:59.217000 audit: BPF prog-id=37 op=UNLOAD May 15 10:38:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.218000 audit: BPF prog-id=57 op=LOAD May 15 10:38:59.218000 audit: BPF prog-id=36 op=UNLOAD May 15 10:38:59.228410 systemd[1]: Started kubelet.service. May 15 10:38:59.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:59.229967 systemd[1]: Stopping kubelet.service... May 15 10:38:59.230204 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:38:59.230357 systemd[1]: Stopped kubelet.service. May 15 10:38:59.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:59.231821 systemd[1]: Starting kubelet.service... May 15 10:38:59.300413 systemd[1]: Started kubelet.service. May 15 10:38:59.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:38:59.337384 kubelet[1584]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:59.337384 kubelet[1584]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:38:59.337384 kubelet[1584]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:38:59.337695 kubelet[1584]: I0515 10:38:59.337429 1584 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:38:59.782137 kubelet[1584]: I0515 10:38:59.782085 1584 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 10:38:59.782137 kubelet[1584]: I0515 10:38:59.782118 1584 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:38:59.782684 kubelet[1584]: I0515 10:38:59.782656 1584 server.go:929] "Client rotation is on, will bootstrap in background" May 15 10:38:59.806917 kubelet[1584]: I0515 10:38:59.806884 1584 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:38:59.807127 kubelet[1584]: E0515 10:38:59.806935 1584 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.55:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:59.812999 kubelet[1584]: E0515 10:38:59.812950 1584 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:38:59.812999 kubelet[1584]: I0515 10:38:59.812992 1584 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:38:59.819072 kubelet[1584]: I0515 10:38:59.819039 1584 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:38:59.820190 kubelet[1584]: I0515 10:38:59.820164 1584 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 10:38:59.820372 kubelet[1584]: I0515 10:38:59.820332 1584 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:38:59.820577 kubelet[1584]: I0515 10:38:59.820367 1584 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:38:59.820673 kubelet[1584]: I0515 10:38:59.820581 1584 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:38:59.820673 kubelet[1584]: I0515 10:38:59.820593 1584 container_manager_linux.go:300] "Creating device plugin manager" May 15 10:38:59.820725 kubelet[1584]: I0515 10:38:59.820713 1584 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:59.850335 kubelet[1584]: I0515 10:38:59.850255 1584 kubelet.go:408] "Attempting to sync node with API server" May 15 10:38:59.850335 kubelet[1584]: I0515 10:38:59.850330 1584 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:38:59.850531 kubelet[1584]: I0515 10:38:59.850372 1584 kubelet.go:314] "Adding apiserver pod source" May 15 10:38:59.850531 kubelet[1584]: I0515 10:38:59.850388 1584 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:38:59.853051 kubelet[1584]: W0515 10:38:59.852987 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.55:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.55:6443: connect: connection refused May 15 10:38:59.853208 kubelet[1584]: E0515 10:38:59.853175 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.55:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:59.853291 kubelet[1584]: W0515 10:38:59.853256 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.55:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.55:6443: connect: connection refused May 15 10:38:59.853334 kubelet[1584]: E0515 10:38:59.853298 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.55:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:59.855084 kubelet[1584]: I0515 10:38:59.855067 1584 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:38:59.859731 kubelet[1584]: I0515 10:38:59.859697 1584 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:38:59.860676 kubelet[1584]: W0515 10:38:59.860659 1584 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. May 15 10:38:59.861537 kubelet[1584]: I0515 10:38:59.861519 1584 server.go:1269] "Started kubelet" May 15 10:38:59.864233 kubelet[1584]: I0515 10:38:59.864169 1584 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:38:59.864856 kubelet[1584]: I0515 10:38:59.864455 1584 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:38:59.864856 kubelet[1584]: I0515 10:38:59.864504 1584 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:38:59.863000 audit[1584]: AVC avc: denied { mac_admin } for pid=1584 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.863000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:59.863000 audit[1584]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ac0120 a1=c0007697b8 a2=c000ac00f0 a3=25 items=0 ppid=1 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.863000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:59.863000 audit[1584]: AVC avc: denied { mac_admin } for pid=1584 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:38:59.863000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:38:59.863000 audit[1584]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000af43c0 a1=c0007697d0 a2=c000ac01b0 a3=25 items=0 ppid=1 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.863000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:38:59.865421 kubelet[1584]: I0515 10:38:59.865100 1584 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:38:59.865421 kubelet[1584]: I0515 10:38:59.865130 1584 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:38:59.865421 kubelet[1584]: I0515 10:38:59.865184 1584 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:38:59.865421 kubelet[1584]: I0515 10:38:59.865368 1584 server.go:460] "Adding debug handlers to kubelet server" May 15 10:38:59.866598 kubelet[1584]: I0515 10:38:59.866403 1584 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:38:59.868225 kubelet[1584]: I0515 10:38:59.868141 1584 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 10:38:59.868225 kubelet[1584]: I0515 10:38:59.868223 1584 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 10:38:59.868304 kubelet[1584]: I0515 10:38:59.868268 1584 reconciler.go:26] "Reconciler: start to sync state" May 15 10:38:59.868000 audit[1596]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1596 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:59.868000 audit[1596]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffec395dfc0 a2=0 a3=7ffec395dfac items=0 ppid=1584 pid=1596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.868000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:38:59.870186 kubelet[1584]: E0515 10:38:59.869074 1584 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.55:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.55:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad2181843c9c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:38:59.86149494 +0000 UTC m=+0.557045890,LastTimestamp:2025-05-15 10:38:59.86149494 +0000 UTC m=+0.557045890,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:38:59.870399 kubelet[1584]: I0515 10:38:59.870377 1584 factory.go:221] Registration of the systemd container factory successfully May 15 10:38:59.870473 kubelet[1584]: I0515 10:38:59.870462 1584 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:38:59.869000 audit[1597]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1597 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:59.869000 audit[1597]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5cb67c50 a2=0 a3=7fff5cb67c3c items=0 ppid=1584 pid=1597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.869000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:38:59.871309 kubelet[1584]: W0515 10:38:59.871253 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.55:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.55:6443: connect: connection refused May 15 10:38:59.871363 kubelet[1584]: E0515 10:38:59.871323 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.55:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:59.871363 kubelet[1584]: E0515 10:38:59.871349 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:59.871413 kubelet[1584]: E0515 10:38:59.871387 1584 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.55:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.55:6443: connect: connection refused" interval="200ms" May 15 10:38:59.871491 kubelet[1584]: E0515 10:38:59.871473 1584 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:38:59.871776 kubelet[1584]: I0515 10:38:59.871758 1584 factory.go:221] Registration of the containerd container factory successfully May 15 10:38:59.871000 audit[1599]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1599 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:59.871000 audit[1599]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc84cd24f0 a2=0 a3=7ffc84cd24dc items=0 ppid=1584 pid=1599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.871000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:59.873000 audit[1601]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1601 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:59.873000 audit[1601]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe57bc83e0 a2=0 a3=7ffe57bc83cc items=0 ppid=1584 pid=1601 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.873000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:38:59.878000 audit[1604]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1604 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:59.878000 audit[1604]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcbf05f100 a2=0 a3=7ffcbf05f0ec items=0 ppid=1584 pid=1604 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.878000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 May 15 10:38:59.880851 kubelet[1584]: I0515 10:38:59.880819 1584 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:38:59.879000 audit[1605]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1605 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:59.879000 audit[1605]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd6959e060 a2=0 a3=7ffd6959e04c items=0 ppid=1584 pid=1605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.879000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 May 15 10:38:59.881597 kubelet[1584]: I0515 10:38:59.881528 1584 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:38:59.881597 kubelet[1584]: I0515 10:38:59.881550 1584 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:38:59.881597 kubelet[1584]: I0515 10:38:59.881570 1584 kubelet.go:2321] "Starting kubelet main sync loop" May 15 10:38:59.881678 kubelet[1584]: E0515 10:38:59.881605 1584 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:38:59.880000 audit[1607]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1607 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:59.880000 audit[1607]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffe11b2970 a2=0 a3=7fffe11b295c items=0 ppid=1584 pid=1607 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.880000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:38:59.881000 audit[1608]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1608 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:59.881000 audit[1608]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3078df00 a2=0 a3=7ffc3078deec items=0 ppid=1584 pid=1608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:38:59.881000 audit[1609]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1609 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:38:59.881000 audit[1609]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebe6bea40 a2=0 a3=7ffebe6bea2c items=0 ppid=1584 pid=1609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:38:59.882000 audit[1611]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1611 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:59.882000 audit[1611]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda9f18a60 a2=0 a3=7ffda9f18a4c items=0 ppid=1584 pid=1611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.882000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 May 15 10:38:59.883000 audit[1612]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1612 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:59.883000 audit[1612]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffeb2fa8b20 a2=0 a3=7ffeb2fa8b0c items=0 ppid=1584 pid=1612 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.883000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 May 15 10:38:59.884000 audit[1614]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1614 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:38:59.884000 audit[1614]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcb0459cd0 a2=0 a3=7ffcb0459cbc items=0 ppid=1584 pid=1614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:38:59.884000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 May 15 10:38:59.886630 kubelet[1584]: W0515 10:38:59.886444 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.55:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.55:6443: connect: connection refused May 15 10:38:59.886630 kubelet[1584]: E0515 10:38:59.886490 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.55:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:38:59.887364 kubelet[1584]: I0515 10:38:59.887341 1584 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:38:59.887364 kubelet[1584]: I0515 10:38:59.887362 1584 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:38:59.887430 kubelet[1584]: I0515 10:38:59.887378 1584 state_mem.go:36] "Initialized new in-memory state store" May 15 10:38:59.972017 kubelet[1584]: E0515 10:38:59.971980 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:38:59.982260 kubelet[1584]: E0515 10:38:59.982207 1584 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:39:00.005984 kubelet[1584]: E0515 10:39:00.005848 1584 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.55:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.55:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.183fad2181843c9c default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2025-05-15 10:38:59.86149494 +0000 UTC m=+0.557045890,LastTimestamp:2025-05-15 10:38:59.86149494 +0000 UTC m=+0.557045890,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" May 15 10:39:00.072134 kubelet[1584]: E0515 10:39:00.072059 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:00.072833 kubelet[1584]: E0515 10:39:00.072760 1584 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.55:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.55:6443: connect: connection refused" interval="400ms" May 15 10:39:00.165958 kubelet[1584]: I0515 10:39:00.165888 1584 policy_none.go:49] "None policy: Start" May 15 10:39:00.166595 kubelet[1584]: I0515 10:39:00.166575 1584 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:39:00.166595 kubelet[1584]: I0515 10:39:00.166602 1584 state_mem.go:35] "Initializing new in-memory state store" May 15 10:39:00.172827 kubelet[1584]: E0515 10:39:00.172787 1584 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"localhost\" not found" May 15 10:39:00.174925 systemd[1]: Created slice kubepods.slice. May 15 10:39:00.178256 systemd[1]: Created slice kubepods-burstable.slice. May 15 10:39:00.180627 systemd[1]: Created slice kubepods-besteffort.slice. May 15 10:39:00.182329 kubelet[1584]: E0515 10:39:00.182296 1584 kubelet.go:2345] "Skipping pod synchronization" err="container runtime status check may not have completed yet" May 15 10:39:00.187452 kubelet[1584]: I0515 10:39:00.187423 1584 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:39:00.187452 kubelet[1584]: I0515 10:39:00.187473 1584 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:39:00.186000 audit[1584]: AVC avc: denied { mac_admin } for pid=1584 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:00.186000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:00.186000 audit[1584]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000ac1920 a1=c000bb9dd0 a2=c000ac18f0 a3=25 items=0 ppid=1 pid=1584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:00.186000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:00.187831 kubelet[1584]: I0515 10:39:00.187583 1584 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:39:00.187831 kubelet[1584]: I0515 10:39:00.187592 1584 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:39:00.187879 kubelet[1584]: I0515 10:39:00.187863 1584 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:39:00.188889 kubelet[1584]: E0515 10:39:00.188860 1584 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" May 15 10:39:00.289299 kubelet[1584]: I0515 10:39:00.289265 1584 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:39:00.289645 kubelet[1584]: E0515 10:39:00.289614 1584 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.55:6443/api/v1/nodes\": dial tcp 10.0.0.55:6443: connect: connection refused" node="localhost" May 15 10:39:00.474004 kubelet[1584]: E0515 10:39:00.473902 1584 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.55:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.55:6443: connect: connection refused" interval="800ms" May 15 10:39:00.490860 kubelet[1584]: I0515 10:39:00.490831 1584 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:39:00.491119 kubelet[1584]: E0515 10:39:00.491094 1584 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.55:6443/api/v1/nodes\": dial tcp 10.0.0.55:6443: connect: connection refused" node="localhost" May 15 10:39:00.588849 systemd[1]: Created slice kubepods-burstable-pod2734a421d47bbac575c5919eca77c417.slice. May 15 10:39:00.596216 systemd[1]: Created slice kubepods-burstable-podd4a6b755cb4739fbca401212ebb82b6d.slice. May 15 10:39:00.605604 systemd[1]: Created slice kubepods-burstable-pod0613557c150e4f35d1f3f822b5f32ff1.slice. May 15 10:39:00.673143 kubelet[1584]: I0515 10:39:00.673114 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2734a421d47bbac575c5919eca77c417-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"2734a421d47bbac575c5919eca77c417\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:00.673228 kubelet[1584]: I0515 10:39:00.673150 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:00.673228 kubelet[1584]: I0515 10:39:00.673172 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:00.673228 kubelet[1584]: I0515 10:39:00.673193 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:00.673228 kubelet[1584]: I0515 10:39:00.673211 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 15 10:39:00.673336 kubelet[1584]: I0515 10:39:00.673242 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2734a421d47bbac575c5919eca77c417-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"2734a421d47bbac575c5919eca77c417\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:00.673336 kubelet[1584]: I0515 10:39:00.673279 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2734a421d47bbac575c5919eca77c417-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"2734a421d47bbac575c5919eca77c417\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:00.673336 kubelet[1584]: I0515 10:39:00.673298 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:00.673336 kubelet[1584]: I0515 10:39:00.673314 1584 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:00.771926 kubelet[1584]: W0515 10:39:00.771857 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.0.0.55:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.55:6443: connect: connection refused May 15 10:39:00.772078 kubelet[1584]: E0515 10:39:00.771941 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.0.0.55:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:39:00.892847 kubelet[1584]: I0515 10:39:00.892787 1584 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:39:00.893179 kubelet[1584]: E0515 10:39:00.893124 1584 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.55:6443/api/v1/nodes\": dial tcp 10.0.0.55:6443: connect: connection refused" node="localhost" May 15 10:39:00.895388 kubelet[1584]: E0515 10:39:00.895363 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:00.895905 env[1199]: time="2025-05-15T10:39:00.895848958Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:2734a421d47bbac575c5919eca77c417,Namespace:kube-system,Attempt:0,}" May 15 10:39:00.904027 kubelet[1584]: E0515 10:39:00.903995 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:00.904383 env[1199]: time="2025-05-15T10:39:00.904342863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,}" May 15 10:39:00.907657 kubelet[1584]: E0515 10:39:00.907625 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:00.908114 env[1199]: time="2025-05-15T10:39:00.908079555Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,}" May 15 10:39:00.916542 kubelet[1584]: W0515 10:39:00.916491 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.0.0.55:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.55:6443: connect: connection refused May 15 10:39:00.916611 kubelet[1584]: E0515 10:39:00.916547 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.0.0.55:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:39:01.018815 kubelet[1584]: W0515 10:39:01.018719 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.0.0.55:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.0.0.55:6443: connect: connection refused May 15 10:39:01.018956 kubelet[1584]: E0515 10:39:01.018830 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.0.0.55:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:39:01.040637 kubelet[1584]: W0515 10:39:01.040521 1584 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.0.0.55:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.55:6443: connect: connection refused May 15 10:39:01.040637 kubelet[1584]: E0515 10:39:01.040584 1584 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.0.0.55:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:39:01.274764 kubelet[1584]: E0515 10:39:01.274709 1584 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.55:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.55:6443: connect: connection refused" interval="1.6s" May 15 10:39:01.694779 kubelet[1584]: I0515 10:39:01.694733 1584 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:39:01.695182 kubelet[1584]: E0515 10:39:01.695144 1584 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.0.0.55:6443/api/v1/nodes\": dial tcp 10.0.0.55:6443: connect: connection refused" node="localhost" May 15 10:39:01.840021 kubelet[1584]: E0515 10:39:01.839955 1584 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.0.0.55:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.0.0.55:6443: connect: connection refused" logger="UnhandledError" May 15 10:39:02.091614 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3453452781.mount: Deactivated successfully. May 15 10:39:02.097284 env[1199]: time="2025-05-15T10:39:02.097235533Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.098129 env[1199]: time="2025-05-15T10:39:02.098084211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.099750 env[1199]: time="2025-05-15T10:39:02.099718827Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.102103 env[1199]: time="2025-05-15T10:39:02.102054817Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.102986 env[1199]: time="2025-05-15T10:39:02.102955473Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.104824 env[1199]: time="2025-05-15T10:39:02.104789900Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.106370 env[1199]: time="2025-05-15T10:39:02.106339411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.108982 env[1199]: time="2025-05-15T10:39:02.108963700Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.110317 env[1199]: time="2025-05-15T10:39:02.110292183Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.111436 env[1199]: time="2025-05-15T10:39:02.111395238Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.111985 env[1199]: time="2025-05-15T10:39:02.111956992Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.112509 env[1199]: time="2025-05-15T10:39:02.112484421Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:02.132285 env[1199]: time="2025-05-15T10:39:02.132218347Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:02.132424 env[1199]: time="2025-05-15T10:39:02.132266341Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:02.132424 env[1199]: time="2025-05-15T10:39:02.132281025Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:02.132539 env[1199]: time="2025-05-15T10:39:02.132408128Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ed3f5f3b51f4de034e2b3ee0dbdcfbc61c0bad1bb2cb1bf4efcc292710dfade7 pid=1625 runtime=io.containerd.runc.v2 May 15 10:39:02.146023 env[1199]: time="2025-05-15T10:39:02.145956973Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:02.146023 env[1199]: time="2025-05-15T10:39:02.145998798Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:02.146245 env[1199]: time="2025-05-15T10:39:02.146209825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:02.147069 env[1199]: time="2025-05-15T10:39:02.146480631Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d76b5d2eb2c420efe4540f6ee003c5398205a6f2e0d3cabee824f10b47b93b39 pid=1642 runtime=io.containerd.runc.v2 May 15 10:39:02.150016 systemd[1]: Started cri-containerd-ed3f5f3b51f4de034e2b3ee0dbdcfbc61c0bad1bb2cb1bf4efcc292710dfade7.scope. May 15 10:39:02.176095 env[1199]: time="2025-05-15T10:39:02.176022566Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:02.176249 env[1199]: time="2025-05-15T10:39:02.176107863Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:02.176249 env[1199]: time="2025-05-15T10:39:02.176130031Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:02.176316 env[1199]: time="2025-05-15T10:39:02.176248708Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/43ea8eb8b34afa27823a09d7413287cfec36ac557595d2e53a0fcf51435a6304 pid=1669 runtime=io.containerd.runc.v2 May 15 10:39:02.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.211000 audit: BPF prog-id=58 op=LOAD May 15 10:39:02.212000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1625 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336635663362353166346465303334653262336565306462646366 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1625 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336635663362353166346465303334653262336565306462646366 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.212000 audit: BPF prog-id=59 op=LOAD May 15 10:39:02.212000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000228d60 items=0 ppid=1625 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336635663362353166346465303334653262336565306462646366 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.213000 audit: BPF prog-id=60 op=LOAD May 15 10:39:02.213000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000228da8 items=0 ppid=1625 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336635663362353166346465303334653262336565306462646366 May 15 10:39:02.214000 audit: BPF prog-id=60 op=UNLOAD May 15 10:39:02.214000 audit: BPF prog-id=59 op=UNLOAD May 15 10:39:02.214000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { perfmon } for pid=1639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit[1639]: AVC avc: denied { bpf } for pid=1639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.214000 audit: BPF prog-id=61 op=LOAD May 15 10:39:02.214000 audit[1639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002291b8 items=0 ppid=1625 pid=1639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6564336635663362353166346465303334653262336565306462646366 May 15 10:39:02.237184 systemd[1]: Started cri-containerd-43ea8eb8b34afa27823a09d7413287cfec36ac557595d2e53a0fcf51435a6304.scope. May 15 10:39:02.241082 systemd[1]: Started cri-containerd-d76b5d2eb2c420efe4540f6ee003c5398205a6f2e0d3cabee824f10b47b93b39.scope. May 15 10:39:02.299159 env[1199]: time="2025-05-15T10:39:02.299098560Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:0613557c150e4f35d1f3f822b5f32ff1,Namespace:kube-system,Attempt:0,} returns sandbox id \"ed3f5f3b51f4de034e2b3ee0dbdcfbc61c0bad1bb2cb1bf4efcc292710dfade7\"" May 15 10:39:02.300489 kubelet[1584]: E0515 10:39:02.300451 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.303000 audit: BPF prog-id=62 op=LOAD May 15 10:39:02.304000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366235643265623263343230656665343534306636656530303363 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366235643265623263343230656665343534306636656530303363 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.304000 audit: BPF prog-id=63 op=LOAD May 15 10:39:02.304000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000396d90 items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366235643265623263343230656665343534306636656530303363 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.305000 audit: BPF prog-id=64 op=LOAD May 15 10:39:02.305000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000396dd8 items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.305000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366235643265623263343230656665343534306636656530303363 May 15 10:39:02.306000 audit: BPF prog-id=64 op=UNLOAD May 15 10:39:02.306000 audit: BPF prog-id=63 op=UNLOAD May 15 10:39:02.307127 env[1199]: time="2025-05-15T10:39:02.307088191Z" level=info msg="CreateContainer within sandbox \"ed3f5f3b51f4de034e2b3ee0dbdcfbc61c0bad1bb2cb1bf4efcc292710dfade7\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" May 15 10:39:02.306000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { perfmon } for pid=1670 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit[1670]: AVC avc: denied { bpf } for pid=1670 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.306000 audit: BPF prog-id=65 op=LOAD May 15 10:39:02.306000 audit[1670]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003971e8 items=0 ppid=1642 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437366235643265623263343230656665343534306636656530303363 May 15 10:39:02.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit: BPF prog-id=66 op=LOAD May 15 10:39:02.309000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000245c48 a2=10 a3=1c items=0 ppid=1669 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656138656238623334616661323738323361303964373431333238 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002456b0 a2=3c a3=c items=0 ppid=1669 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656138656238623334616661323738323361303964373431333238 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.309000 audit: BPF prog-id=67 op=LOAD May 15 10:39:02.309000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002459d8 a2=78 a3=c0002e3bc0 items=0 ppid=1669 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656138656238623334616661323738323361303964373431333238 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit: BPF prog-id=68 op=LOAD May 15 10:39:02.310000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000245770 a2=78 a3=c0002e3c08 items=0 ppid=1669 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656138656238623334616661323738323361303964373431333238 May 15 10:39:02.310000 audit: BPF prog-id=68 op=UNLOAD May 15 10:39:02.310000 audit: BPF prog-id=67 op=UNLOAD May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { perfmon } for pid=1678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit[1678]: AVC avc: denied { bpf } for pid=1678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.310000 audit: BPF prog-id=69 op=LOAD May 15 10:39:02.310000 audit[1678]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000245c30 a2=78 a3=c0003c8018 items=0 ppid=1669 pid=1678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3433656138656238623334616661323738323361303964373431333238 May 15 10:39:02.325494 env[1199]: time="2025-05-15T10:39:02.325313931Z" level=info msg="CreateContainer within sandbox \"ed3f5f3b51f4de034e2b3ee0dbdcfbc61c0bad1bb2cb1bf4efcc292710dfade7\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"d768af2a0c431514050e9ca4e780d1df79e3e7135d5a5991f7b02627374ebef1\"" May 15 10:39:02.326348 env[1199]: time="2025-05-15T10:39:02.326307094Z" level=info msg="StartContainer for \"d768af2a0c431514050e9ca4e780d1df79e3e7135d5a5991f7b02627374ebef1\"" May 15 10:39:02.337324 env[1199]: time="2025-05-15T10:39:02.337202291Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:d4a6b755cb4739fbca401212ebb82b6d,Namespace:kube-system,Attempt:0,} returns sandbox id \"d76b5d2eb2c420efe4540f6ee003c5398205a6f2e0d3cabee824f10b47b93b39\"" May 15 10:39:02.337893 kubelet[1584]: E0515 10:39:02.337867 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:02.339225 env[1199]: time="2025-05-15T10:39:02.339202619Z" level=info msg="CreateContainer within sandbox \"d76b5d2eb2c420efe4540f6ee003c5398205a6f2e0d3cabee824f10b47b93b39\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" May 15 10:39:02.344618 env[1199]: time="2025-05-15T10:39:02.341729064Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:2734a421d47bbac575c5919eca77c417,Namespace:kube-system,Attempt:0,} returns sandbox id \"43ea8eb8b34afa27823a09d7413287cfec36ac557595d2e53a0fcf51435a6304\"" May 15 10:39:02.345413 kubelet[1584]: E0515 10:39:02.345224 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:02.346026 systemd[1]: Started cri-containerd-d768af2a0c431514050e9ca4e780d1df79e3e7135d5a5991f7b02627374ebef1.scope. May 15 10:39:02.347028 env[1199]: time="2025-05-15T10:39:02.347007411Z" level=info msg="CreateContainer within sandbox \"43ea8eb8b34afa27823a09d7413287cfec36ac557595d2e53a0fcf51435a6304\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" May 15 10:39:02.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit: BPF prog-id=70 op=LOAD May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1625 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363861663261306334333135313430353065396361346537383064 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=1625 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363861663261306334333135313430353065396361346537383064 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit: BPF prog-id=71 op=LOAD May 15 10:39:02.368000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0004022d0 items=0 ppid=1625 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363861663261306334333135313430353065396361346537383064 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.368000 audit: BPF prog-id=72 op=LOAD May 15 10:39:02.368000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000402318 items=0 ppid=1625 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363861663261306334333135313430353065396361346537383064 May 15 10:39:02.368000 audit: BPF prog-id=72 op=UNLOAD May 15 10:39:02.369000 audit: BPF prog-id=71 op=UNLOAD May 15 10:39:02.369000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { perfmon } for pid=1742 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit[1742]: AVC avc: denied { bpf } for pid=1742 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.369000 audit: BPF prog-id=73 op=LOAD May 15 10:39:02.369000 audit[1742]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000402728 items=0 ppid=1625 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437363861663261306334333135313430353065396361346537383064 May 15 10:39:02.371916 env[1199]: time="2025-05-15T10:39:02.371878068Z" level=info msg="CreateContainer within sandbox \"d76b5d2eb2c420efe4540f6ee003c5398205a6f2e0d3cabee824f10b47b93b39\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"2597efeee82bf4c7cc4e58938a8c652233465dba0615c1d1b0f9ea1ebd03f639\"" May 15 10:39:02.372470 env[1199]: time="2025-05-15T10:39:02.372450424Z" level=info msg="StartContainer for \"2597efeee82bf4c7cc4e58938a8c652233465dba0615c1d1b0f9ea1ebd03f639\"" May 15 10:39:02.374203 env[1199]: time="2025-05-15T10:39:02.374160648Z" level=info msg="CreateContainer within sandbox \"43ea8eb8b34afa27823a09d7413287cfec36ac557595d2e53a0fcf51435a6304\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c965ccadcaf5e780aaf820961108f1e5efeff09f4cfa3299b8134deb406aeda9\"" May 15 10:39:02.374589 env[1199]: time="2025-05-15T10:39:02.374569882Z" level=info msg="StartContainer for \"c965ccadcaf5e780aaf820961108f1e5efeff09f4cfa3299b8134deb406aeda9\"" May 15 10:39:02.387450 systemd[1]: Started cri-containerd-c965ccadcaf5e780aaf820961108f1e5efeff09f4cfa3299b8134deb406aeda9.scope. May 15 10:39:02.396770 systemd[1]: Started cri-containerd-2597efeee82bf4c7cc4e58938a8c652233465dba0615c1d1b0f9ea1ebd03f639.scope. May 15 10:39:02.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.398000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.398000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.399000 audit: BPF prog-id=74 op=LOAD May 15 10:39:02.400825 env[1199]: time="2025-05-15T10:39:02.399680862Z" level=info msg="StartContainer for \"d768af2a0c431514050e9ca4e780d1df79e3e7135d5a5991f7b02627374ebef1\" returns successfully" May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1669 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339363563636164636166356537383061616638323039363131303866 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1669 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339363563636164636166356537383061616638323039363131303866 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit: BPF prog-id=75 op=LOAD May 15 10:39:02.400000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003ecbe0 items=0 ppid=1669 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339363563636164636166356537383061616638323039363131303866 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit: BPF prog-id=76 op=LOAD May 15 10:39:02.400000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003ecc28 items=0 ppid=1669 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339363563636164636166356537383061616638323039363131303866 May 15 10:39:02.400000 audit: BPF prog-id=76 op=UNLOAD May 15 10:39:02.400000 audit: BPF prog-id=75 op=UNLOAD May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { perfmon } for pid=1786 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit[1786]: AVC avc: denied { bpf } for pid=1786 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.400000 audit: BPF prog-id=77 op=LOAD May 15 10:39:02.400000 audit[1786]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003ed038 items=0 ppid=1669 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339363563636164636166356537383061616638323039363131303866 May 15 10:39:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit: BPF prog-id=78 op=LOAD May 15 10:39:02.414000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1642 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393765666565653832626634633763633465353839333861386336 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1642 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393765666565653832626634633763633465353839333861386336 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.414000 audit: BPF prog-id=79 op=LOAD May 15 10:39:02.414000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000213910 items=0 ppid=1642 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393765666565653832626634633763633465353839333861386336 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit: BPF prog-id=80 op=LOAD May 15 10:39:02.415000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000213958 items=0 ppid=1642 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393765666565653832626634633763633465353839333861386336 May 15 10:39:02.415000 audit: BPF prog-id=80 op=UNLOAD May 15 10:39:02.415000 audit: BPF prog-id=79 op=UNLOAD May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { perfmon } for pid=1779 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit[1779]: AVC avc: denied { bpf } for pid=1779 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:02.415000 audit: BPF prog-id=81 op=LOAD May 15 10:39:02.415000 audit[1779]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000213d68 items=0 ppid=1642 pid=1779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:02.415000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235393765666565653832626634633763633465353839333861386336 May 15 10:39:02.442008 env[1199]: time="2025-05-15T10:39:02.441958621Z" level=info msg="StartContainer for \"c965ccadcaf5e780aaf820961108f1e5efeff09f4cfa3299b8134deb406aeda9\" returns successfully" May 15 10:39:02.456239 env[1199]: time="2025-05-15T10:39:02.456185972Z" level=info msg="StartContainer for \"2597efeee82bf4c7cc4e58938a8c652233465dba0615c1d1b0f9ea1ebd03f639\" returns successfully" May 15 10:39:02.893426 kubelet[1584]: E0515 10:39:02.893349 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:02.895024 kubelet[1584]: E0515 10:39:02.894973 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:02.896223 kubelet[1584]: E0515 10:39:02.896211 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:03.215000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:03.215000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000d72000 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:03.215000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:03.216000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:03.216000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6 a1=c000e62000 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:03.216000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:03.296924 kubelet[1584]: I0515 10:39:03.296884 1584 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:39:03.898881 kubelet[1584]: E0515 10:39:03.898851 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:04.228871 kernel: kauditd_printk_skb: 563 callbacks suppressed May 15 10:39:04.229002 kernel: audit: type=1400 audit(1747305544.219:538): avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.229024 kernel: audit: type=1400 audit(1747305544.219:539): avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.219000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.219000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.219000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004dfe510 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.240886 kernel: audit: type=1300 audit(1747305544.219:539): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004dfe510 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.247824 kernel: audit: type=1327 audit(1747305544.219:539): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.220000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.257668 kernel: audit: type=1400 audit(1747305544.220:540): avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.257742 kernel: audit: type=1300 audit(1747305544.220:540): arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00219e0e0 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.220000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=43 a1=c00219e0e0 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.266360 kernel: audit: type=1327 audit(1747305544.220:540): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.266433 kernel: audit: type=1400 audit(1747305544.220:541): avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.220000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.271647 kernel: audit: type=1300 audit(1747305544.220:541): arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c004dfe8d0 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.220000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c004dfe8d0 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.276152 kernel: audit: type=1327 audit(1747305544.220:541): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.220000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.276215 kubelet[1584]: E0515 10:39:04.274898 1584 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" May 15 10:39:04.219000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c006c18030 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.219000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.240000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.240000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0060a98c0 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.240000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:04.240000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0054d7a20 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:39:04.240000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:39:04.341172 kubelet[1584]: I0515 10:39:04.341120 1584 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 15 10:39:04.855819 kubelet[1584]: I0515 10:39:04.855765 1584 apiserver.go:52] "Watching apiserver" May 15 10:39:04.868959 kubelet[1584]: I0515 10:39:04.868930 1584 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 10:39:06.305967 kubelet[1584]: E0515 10:39:06.305919 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:06.741468 systemd[1]: Reloading. May 15 10:39:06.827995 /usr/lib/systemd/system-generators/torcx-generator[1882]: time="2025-05-15T10:39:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.100 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.100 /var/lib/torcx/store]" May 15 10:39:06.828022 /usr/lib/systemd/system-generators/torcx-generator[1882]: time="2025-05-15T10:39:06Z" level=info msg="torcx already run" May 15 10:39:06.890697 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. May 15 10:39:06.890713 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. May 15 10:39:06.901586 kubelet[1584]: E0515 10:39:06.901555 1584 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:06.910286 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. May 15 10:39:06.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.982000 audit: BPF prog-id=82 op=LOAD May 15 10:39:06.982000 audit: BPF prog-id=43 op=UNLOAD May 15 10:39:06.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.984000 audit: BPF prog-id=83 op=LOAD May 15 10:39:06.984000 audit: BPF prog-id=58 op=UNLOAD May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit: BPF prog-id=84 op=LOAD May 15 10:39:06.985000 audit: BPF prog-id=78 op=UNLOAD May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.985000 audit: BPF prog-id=85 op=LOAD May 15 10:39:06.985000 audit: BPF prog-id=62 op=UNLOAD May 15 10:39:06.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.986000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit: BPF prog-id=86 op=LOAD May 15 10:39:06.987000 audit: BPF prog-id=44 op=UNLOAD May 15 10:39:06.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit: BPF prog-id=87 op=LOAD May 15 10:39:06.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.987000 audit: BPF prog-id=88 op=LOAD May 15 10:39:06.987000 audit: BPF prog-id=45 op=UNLOAD May 15 10:39:06.987000 audit: BPF prog-id=46 op=UNLOAD May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit: BPF prog-id=89 op=LOAD May 15 10:39:06.988000 audit: BPF prog-id=47 op=UNLOAD May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit: BPF prog-id=90 op=LOAD May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.988000 audit: BPF prog-id=91 op=LOAD May 15 10:39:06.988000 audit: BPF prog-id=48 op=UNLOAD May 15 10:39:06.988000 audit: BPF prog-id=49 op=UNLOAD May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit: BPF prog-id=92 op=LOAD May 15 10:39:06.989000 audit: BPF prog-id=74 op=UNLOAD May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.989000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit: BPF prog-id=93 op=LOAD May 15 10:39:06.990000 audit: BPF prog-id=66 op=UNLOAD May 15 10:39:06.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.990000 audit: BPF prog-id=94 op=LOAD May 15 10:39:06.990000 audit: BPF prog-id=50 op=UNLOAD May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit: BPF prog-id=95 op=LOAD May 15 10:39:06.991000 audit: BPF prog-id=51 op=UNLOAD May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit: BPF prog-id=96 op=LOAD May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit: BPF prog-id=97 op=LOAD May 15 10:39:06.991000 audit: BPF prog-id=52 op=UNLOAD May 15 10:39:06.991000 audit: BPF prog-id=53 op=UNLOAD May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.991000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit: BPF prog-id=98 op=LOAD May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit: BPF prog-id=99 op=LOAD May 15 10:39:06.992000 audit: BPF prog-id=54 op=UNLOAD May 15 10:39:06.992000 audit: BPF prog-id=55 op=UNLOAD May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.992000 audit: BPF prog-id=100 op=LOAD May 15 10:39:06.992000 audit: BPF prog-id=56 op=UNLOAD May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit: BPF prog-id=101 op=LOAD May 15 10:39:06.993000 audit: BPF prog-id=70 op=UNLOAD May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.993000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.994000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:06.994000 audit: BPF prog-id=102 op=LOAD May 15 10:39:06.994000 audit: BPF prog-id=57 op=UNLOAD May 15 10:39:07.004592 systemd[1]: Stopping kubelet.service... May 15 10:39:07.032279 systemd[1]: kubelet.service: Deactivated successfully. May 15 10:39:07.031000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:07.032497 systemd[1]: Stopped kubelet.service. May 15 10:39:07.034693 systemd[1]: Starting kubelet.service... May 15 10:39:07.124054 systemd[1]: Started kubelet.service. May 15 10:39:07.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:07.175117 kubelet[1928]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:39:07.175117 kubelet[1928]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. May 15 10:39:07.175117 kubelet[1928]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. May 15 10:39:07.175506 kubelet[1928]: I0515 10:39:07.175174 1928 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" May 15 10:39:07.182784 kubelet[1928]: I0515 10:39:07.182740 1928 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" May 15 10:39:07.182784 kubelet[1928]: I0515 10:39:07.182777 1928 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" May 15 10:39:07.183720 kubelet[1928]: I0515 10:39:07.183698 1928 server.go:929] "Client rotation is on, will bootstrap in background" May 15 10:39:07.189081 kubelet[1928]: I0515 10:39:07.187943 1928 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". May 15 10:39:07.191027 kubelet[1928]: I0515 10:39:07.190997 1928 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" May 15 10:39:07.195070 kubelet[1928]: E0515 10:39:07.195003 1928 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" May 15 10:39:07.195070 kubelet[1928]: I0515 10:39:07.195055 1928 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." May 15 10:39:07.201080 kubelet[1928]: I0515 10:39:07.201047 1928 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" May 15 10:39:07.201182 kubelet[1928]: I0515 10:39:07.201154 1928 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" May 15 10:39:07.201312 kubelet[1928]: I0515 10:39:07.201281 1928 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] May 15 10:39:07.202236 kubelet[1928]: I0515 10:39:07.201313 1928 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"localhost","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} May 15 10:39:07.202236 kubelet[1928]: I0515 10:39:07.201624 1928 topology_manager.go:138] "Creating topology manager with none policy" May 15 10:39:07.202236 kubelet[1928]: I0515 10:39:07.201636 1928 container_manager_linux.go:300] "Creating device plugin manager" May 15 10:39:07.202236 kubelet[1928]: I0515 10:39:07.201666 1928 state_mem.go:36] "Initialized new in-memory state store" May 15 10:39:07.202236 kubelet[1928]: I0515 10:39:07.201774 1928 kubelet.go:408] "Attempting to sync node with API server" May 15 10:39:07.204158 kubelet[1928]: I0515 10:39:07.201788 1928 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" May 15 10:39:07.204158 kubelet[1928]: I0515 10:39:07.201834 1928 kubelet.go:314] "Adding apiserver pod source" May 15 10:39:07.204158 kubelet[1928]: I0515 10:39:07.201848 1928 apiserver.go:42] "Waiting for node sync before watching apiserver pods" May 15 10:39:07.204432 kubelet[1928]: I0515 10:39:07.204410 1928 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" May 15 10:39:07.204990 kubelet[1928]: I0515 10:39:07.204974 1928 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" May 15 10:39:07.205577 kubelet[1928]: I0515 10:39:07.205564 1928 server.go:1269] "Started kubelet" May 15 10:39:07.205831 kubelet[1928]: I0515 10:39:07.205754 1928 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 May 15 10:39:07.206154 kubelet[1928]: I0515 10:39:07.206113 1928 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 May 15 10:39:07.206449 kubelet[1928]: I0515 10:39:07.206432 1928 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" May 15 10:39:07.209000 audit[1928]: AVC avc: denied { mac_admin } for pid=1928 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:07.209000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:07.215541 kubelet[1928]: I0515 10:39:07.214815 1928 server.go:460] "Adding debug handlers to kubelet server" May 15 10:39:07.209000 audit[1928]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dc8a50 a1=c0004b78c0 a2=c000dc8a20 a3=25 items=0 ppid=1 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:07.209000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:07.216000 audit[1928]: AVC avc: denied { mac_admin } for pid=1928 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:07.216000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:07.216000 audit[1928]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00097c3e0 a1=c0004b78d8 a2=c000dc8ae0 a3=25 items=0 ppid=1 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:07.216000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:07.217141 kubelet[1928]: I0515 10:39:07.216928 1928 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" May 15 10:39:07.217141 kubelet[1928]: I0515 10:39:07.217018 1928 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" May 15 10:39:07.217141 kubelet[1928]: I0515 10:39:07.217061 1928 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" May 15 10:39:07.217949 kubelet[1928]: I0515 10:39:07.217913 1928 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" May 15 10:39:07.218730 kubelet[1928]: I0515 10:39:07.218684 1928 volume_manager.go:289] "Starting Kubelet Volume Manager" May 15 10:39:07.219078 kubelet[1928]: I0515 10:39:07.219052 1928 desired_state_of_world_populator.go:146] "Desired state populator starts to run" May 15 10:39:07.219207 kubelet[1928]: I0515 10:39:07.219190 1928 reconciler.go:26] "Reconciler: start to sync state" May 15 10:39:07.219993 kubelet[1928]: I0515 10:39:07.219976 1928 factory.go:221] Registration of the systemd container factory successfully May 15 10:39:07.220501 kubelet[1928]: I0515 10:39:07.220466 1928 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory May 15 10:39:07.221616 kubelet[1928]: E0515 10:39:07.221596 1928 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" May 15 10:39:07.224160 kubelet[1928]: I0515 10:39:07.224129 1928 factory.go:221] Registration of the containerd container factory successfully May 15 10:39:07.229643 kubelet[1928]: I0515 10:39:07.229605 1928 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" May 15 10:39:07.230721 kubelet[1928]: I0515 10:39:07.230570 1928 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" May 15 10:39:07.230721 kubelet[1928]: I0515 10:39:07.230597 1928 status_manager.go:217] "Starting to sync pod status with apiserver" May 15 10:39:07.230721 kubelet[1928]: I0515 10:39:07.230622 1928 kubelet.go:2321] "Starting kubelet main sync loop" May 15 10:39:07.230721 kubelet[1928]: E0515 10:39:07.230659 1928 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" May 15 10:39:07.263293 kubelet[1928]: I0515 10:39:07.263268 1928 cpu_manager.go:214] "Starting CPU manager" policy="none" May 15 10:39:07.263293 kubelet[1928]: I0515 10:39:07.263291 1928 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" May 15 10:39:07.263453 kubelet[1928]: I0515 10:39:07.263311 1928 state_mem.go:36] "Initialized new in-memory state store" May 15 10:39:07.263503 kubelet[1928]: I0515 10:39:07.263484 1928 state_mem.go:88] "Updated default CPUSet" cpuSet="" May 15 10:39:07.263537 kubelet[1928]: I0515 10:39:07.263502 1928 state_mem.go:96] "Updated CPUSet assignments" assignments={} May 15 10:39:07.263537 kubelet[1928]: I0515 10:39:07.263534 1928 policy_none.go:49] "None policy: Start" May 15 10:39:07.264197 kubelet[1928]: I0515 10:39:07.264181 1928 memory_manager.go:170] "Starting memorymanager" policy="None" May 15 10:39:07.264256 kubelet[1928]: I0515 10:39:07.264201 1928 state_mem.go:35] "Initializing new in-memory state store" May 15 10:39:07.264360 kubelet[1928]: I0515 10:39:07.264346 1928 state_mem.go:75] "Updated machine memory state" May 15 10:39:07.270081 kubelet[1928]: I0515 10:39:07.270047 1928 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" May 15 10:39:07.269000 audit[1928]: AVC avc: denied { mac_admin } for pid=1928 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:07.269000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" May 15 10:39:07.269000 audit[1928]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000fb0630 a1=c000b21f68 a2=c000fb0600 a3=25 items=0 ppid=1 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:07.269000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 May 15 10:39:07.270305 kubelet[1928]: I0515 10:39:07.270129 1928 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" May 15 10:39:07.271491 kubelet[1928]: I0515 10:39:07.271463 1928 eviction_manager.go:189] "Eviction manager: starting control loop" May 15 10:39:07.271594 kubelet[1928]: I0515 10:39:07.271491 1928 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" May 15 10:39:07.273030 kubelet[1928]: I0515 10:39:07.272832 1928 plugin_manager.go:118] "Starting Kubelet Plugin Manager" May 15 10:39:07.346551 kubelet[1928]: E0515 10:39:07.346476 1928 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" May 15 10:39:07.377952 kubelet[1928]: I0515 10:39:07.377919 1928 kubelet_node_status.go:72] "Attempting to register node" node="localhost" May 15 10:39:07.419744 kubelet[1928]: I0515 10:39:07.419683 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:07.419744 kubelet[1928]: I0515 10:39:07.419730 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:07.419744 kubelet[1928]: I0515 10:39:07.419759 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/2734a421d47bbac575c5919eca77c417-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"2734a421d47bbac575c5919eca77c417\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:07.419999 kubelet[1928]: I0515 10:39:07.419780 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/2734a421d47bbac575c5919eca77c417-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"2734a421d47bbac575c5919eca77c417\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:07.419999 kubelet[1928]: I0515 10:39:07.419840 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:07.419999 kubelet[1928]: I0515 10:39:07.419905 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:07.419999 kubelet[1928]: I0515 10:39:07.419947 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0613557c150e4f35d1f3f822b5f32ff1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"0613557c150e4f35d1f3f822b5f32ff1\") " pod="kube-system/kube-scheduler-localhost" May 15 10:39:07.419999 kubelet[1928]: I0515 10:39:07.419971 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/2734a421d47bbac575c5919eca77c417-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"2734a421d47bbac575c5919eca77c417\") " pod="kube-system/kube-apiserver-localhost" May 15 10:39:07.420177 kubelet[1928]: I0515 10:39:07.419986 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d4a6b755cb4739fbca401212ebb82b6d-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"d4a6b755cb4739fbca401212ebb82b6d\") " pod="kube-system/kube-controller-manager-localhost" May 15 10:39:07.482417 kubelet[1928]: I0515 10:39:07.482382 1928 kubelet_node_status.go:111] "Node was previously registered" node="localhost" May 15 10:39:07.482665 kubelet[1928]: I0515 10:39:07.482651 1928 kubelet_node_status.go:75] "Successfully registered node" node="localhost" May 15 10:39:07.646493 kubelet[1928]: E0515 10:39:07.646372 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:07.646674 kubelet[1928]: E0515 10:39:07.646647 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:07.646855 kubelet[1928]: E0515 10:39:07.646700 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:07.919000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=7323 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 May 15 10:39:07.919000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000da85c0 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:07.919000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:08.203681 kubelet[1928]: I0515 10:39:08.203564 1928 apiserver.go:52] "Watching apiserver" May 15 10:39:08.219602 kubelet[1928]: I0515 10:39:08.219544 1928 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" May 15 10:39:08.242428 kubelet[1928]: E0515 10:39:08.242398 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:08.341250 kubelet[1928]: E0515 10:39:08.341214 1928 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" May 15 10:39:08.341582 kubelet[1928]: E0515 10:39:08.341566 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:08.342250 kubelet[1928]: I0515 10:39:08.342217 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.342208311 podStartE2EDuration="1.342208311s" podCreationTimestamp="2025-05-15 10:39:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:08.342002621 +0000 UTC m=+1.209688926" watchObservedRunningTime="2025-05-15 10:39:08.342208311 +0000 UTC m=+1.209894617" May 15 10:39:08.343662 kubelet[1928]: E0515 10:39:08.342776 1928 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" May 15 10:39:08.343847 kubelet[1928]: E0515 10:39:08.343822 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:08.361925 kubelet[1928]: I0515 10:39:08.361815 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.361774242 podStartE2EDuration="1.361774242s" podCreationTimestamp="2025-05-15 10:39:07 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:08.353922822 +0000 UTC m=+1.221609127" watchObservedRunningTime="2025-05-15 10:39:08.361774242 +0000 UTC m=+1.229460547" May 15 10:39:09.243166 kubelet[1928]: E0515 10:39:09.243139 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:09.243762 kubelet[1928]: E0515 10:39:09.243748 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:09.244068 kubelet[1928]: E0515 10:39:09.244032 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:10.244817 kubelet[1928]: E0515 10:39:10.244757 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:10.973000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:10.979548 kernel: kauditd_printk_skb: 269 callbacks suppressed May 15 10:39:10.979649 kernel: audit: type=1400 audit(1747305550.973:794): avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:10.979676 kernel: audit: type=1400 audit(1747305550.974:795): avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:10.974000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:10.983416 kernel: audit: type=1300 audit(1747305550.974:795): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181c660 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:10.974000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181c660 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:10.974000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:10.992903 kernel: audit: type=1327 audit(1747305550.974:795): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:10.992947 kernel: audit: type=1400 audit(1747305550.974:796): avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:10.974000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:10.996784 kernel: audit: type=1300 audit(1747305550.974:796): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181c820 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:10.974000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00181c820 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:11.001975 kernel: audit: type=1327 audit(1747305550.974:796): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:10.974000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:10.974000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:11.010154 kernel: audit: type=1400 audit(1747305550.974:797): avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:39:11.010210 kernel: audit: type=1300 audit(1747305550.974:797): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018b2c00 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:10.974000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0018b2c00 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:10.974000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:11.019024 kernel: audit: type=1327 audit(1747305550.974:797): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:10.973000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001569520 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:39:10.973000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:39:11.911256 kubelet[1928]: I0515 10:39:11.911218 1928 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" May 15 10:39:11.911748 env[1199]: time="2025-05-15T10:39:11.911539810Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." May 15 10:39:11.911998 kubelet[1928]: I0515 10:39:11.911787 1928 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" May 15 10:39:12.137432 sudo[1337]: pam_unix(sudo:session): session closed for user root May 15 10:39:12.135000 audit[1337]: USER_END pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:12.135000 audit[1337]: CRED_DISP pid=1337 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' May 15 10:39:12.138735 sshd[1333]: pam_unix(sshd:session): session closed for user core May 15 10:39:12.137000 audit[1333]: USER_END pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:12.137000 audit[1333]: CRED_DISP pid=1333 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:12.140976 systemd[1]: sshd@6-10.0.0.55:22-10.0.0.1:52284.service: Deactivated successfully. May 15 10:39:12.139000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.55:22-10.0.0.1:52284 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:12.141642 systemd[1]: session-7.scope: Deactivated successfully. May 15 10:39:12.141763 systemd[1]: session-7.scope: Consumed 3.642s CPU time. May 15 10:39:12.142495 systemd-logind[1187]: Session 7 logged out. Waiting for processes to exit. May 15 10:39:12.143103 systemd-logind[1187]: Removed session 7. May 15 10:39:12.770819 kubelet[1928]: I0515 10:39:12.770750 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=6.770730935 podStartE2EDuration="6.770730935s" podCreationTimestamp="2025-05-15 10:39:06 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:08.362269715 +0000 UTC m=+1.229956050" watchObservedRunningTime="2025-05-15 10:39:12.770730935 +0000 UTC m=+5.638417240" May 15 10:39:12.777210 systemd[1]: Created slice kubepods-besteffort-pod0d87de02_e85f_468b_ae55_bd619975aa35.slice. May 15 10:39:12.872657 kubelet[1928]: I0515 10:39:12.872617 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/0d87de02-e85f-468b-ae55-bd619975aa35-lib-modules\") pod \"kube-proxy-ktfrv\" (UID: \"0d87de02-e85f-468b-ae55-bd619975aa35\") " pod="kube-system/kube-proxy-ktfrv" May 15 10:39:12.872657 kubelet[1928]: I0515 10:39:12.872664 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/0d87de02-e85f-468b-ae55-bd619975aa35-kube-proxy\") pod \"kube-proxy-ktfrv\" (UID: \"0d87de02-e85f-468b-ae55-bd619975aa35\") " pod="kube-system/kube-proxy-ktfrv" May 15 10:39:12.872873 kubelet[1928]: I0515 10:39:12.872683 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/0d87de02-e85f-468b-ae55-bd619975aa35-xtables-lock\") pod \"kube-proxy-ktfrv\" (UID: \"0d87de02-e85f-468b-ae55-bd619975aa35\") " pod="kube-system/kube-proxy-ktfrv" May 15 10:39:12.872873 kubelet[1928]: I0515 10:39:12.872700 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tjs6z\" (UniqueName: \"kubernetes.io/projected/0d87de02-e85f-468b-ae55-bd619975aa35-kube-api-access-tjs6z\") pod \"kube-proxy-ktfrv\" (UID: \"0d87de02-e85f-468b-ae55-bd619975aa35\") " pod="kube-system/kube-proxy-ktfrv" May 15 10:39:12.941580 systemd[1]: Created slice kubepods-besteffort-podacb33c1d_320c_4203_9be5_304e6f036283.slice. May 15 10:39:12.973049 kubelet[1928]: I0515 10:39:12.972997 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/acb33c1d-320c-4203-9be5-304e6f036283-var-lib-calico\") pod \"tigera-operator-6f6897fdc5-gt7qc\" (UID: \"acb33c1d-320c-4203-9be5-304e6f036283\") " pod="tigera-operator/tigera-operator-6f6897fdc5-gt7qc" May 15 10:39:12.973451 kubelet[1928]: I0515 10:39:12.973080 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmq5k\" (UniqueName: \"kubernetes.io/projected/acb33c1d-320c-4203-9be5-304e6f036283-kube-api-access-hmq5k\") pod \"tigera-operator-6f6897fdc5-gt7qc\" (UID: \"acb33c1d-320c-4203-9be5-304e6f036283\") " pod="tigera-operator/tigera-operator-6f6897fdc5-gt7qc" May 15 10:39:12.978161 kubelet[1928]: I0515 10:39:12.978134 1928 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" May 15 10:39:13.084392 kubelet[1928]: E0515 10:39:13.084289 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:13.085308 env[1199]: time="2025-05-15T10:39:13.085265215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ktfrv,Uid:0d87de02-e85f-468b-ae55-bd619975aa35,Namespace:kube-system,Attempt:0,}" May 15 10:39:13.100541 env[1199]: time="2025-05-15T10:39:13.100471631Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:13.100541 env[1199]: time="2025-05-15T10:39:13.100509397Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:13.100541 env[1199]: time="2025-05-15T10:39:13.100519450Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:13.100753 env[1199]: time="2025-05-15T10:39:13.100680584Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f7caa3a4ea91ae724967f67c7e4815273b22fdb0769ffaabfe97697f37e03a52 pid=2025 runtime=io.containerd.runc.v2 May 15 10:39:13.113485 systemd[1]: Started cri-containerd-f7caa3a4ea91ae724967f67c7e4815273b22fdb0769ffaabfe97697f37e03a52.scope. May 15 10:39:13.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit: BPF prog-id=103 op=LOAD May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2025 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636161336134656139316165373234393637663637633765343831 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2025 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636161336134656139316165373234393637663637633765343831 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit: BPF prog-id=104 op=LOAD May 15 10:39:13.123000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c000025490 items=0 ppid=2025 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636161336134656139316165373234393637663637633765343831 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit: BPF prog-id=105 op=LOAD May 15 10:39:13.123000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c0000254d8 items=0 ppid=2025 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636161336134656139316165373234393637663637633765343831 May 15 10:39:13.123000 audit: BPF prog-id=105 op=UNLOAD May 15 10:39:13.123000 audit: BPF prog-id=104 op=UNLOAD May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { perfmon } for pid=2035 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit[2035]: AVC avc: denied { bpf } for pid=2035 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.123000 audit: BPF prog-id=106 op=LOAD May 15 10:39:13.123000 audit[2035]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0000258e8 items=0 ppid=2025 pid=2035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6637636161336134656139316165373234393637663637633765343831 May 15 10:39:13.134259 env[1199]: time="2025-05-15T10:39:13.134219029Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-ktfrv,Uid:0d87de02-e85f-468b-ae55-bd619975aa35,Namespace:kube-system,Attempt:0,} returns sandbox id \"f7caa3a4ea91ae724967f67c7e4815273b22fdb0769ffaabfe97697f37e03a52\"" May 15 10:39:13.134976 kubelet[1928]: E0515 10:39:13.134937 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:13.136989 env[1199]: time="2025-05-15T10:39:13.136952563Z" level=info msg="CreateContainer within sandbox \"f7caa3a4ea91ae724967f67c7e4815273b22fdb0769ffaabfe97697f37e03a52\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" May 15 10:39:13.153712 env[1199]: time="2025-05-15T10:39:13.153659103Z" level=info msg="CreateContainer within sandbox \"f7caa3a4ea91ae724967f67c7e4815273b22fdb0769ffaabfe97697f37e03a52\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"12ece749b15def2cc633970b91f7e638a00a892ccbbee89a4e027d1abbfc5e81\"" May 15 10:39:13.154319 env[1199]: time="2025-05-15T10:39:13.154282794Z" level=info msg="StartContainer for \"12ece749b15def2cc633970b91f7e638a00a892ccbbee89a4e027d1abbfc5e81\"" May 15 10:39:13.168476 systemd[1]: Started cri-containerd-12ece749b15def2cc633970b91f7e638a00a892ccbbee89a4e027d1abbfc5e81.scope. May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7efddc31db58 items=0 ppid=2025 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656365373439623135646566326363363333393730623931663765 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit: BPF prog-id=107 op=LOAD May 15 10:39:13.182000 audit[2063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0002cbba8 items=0 ppid=2025 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656365373439623135646566326363363333393730623931663765 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit: BPF prog-id=108 op=LOAD May 15 10:39:13.182000 audit[2063]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0002cbbf8 items=0 ppid=2025 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656365373439623135646566326363363333393730623931663765 May 15 10:39:13.182000 audit: BPF prog-id=108 op=UNLOAD May 15 10:39:13.182000 audit: BPF prog-id=107 op=UNLOAD May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { perfmon } for pid=2063 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit[2063]: AVC avc: denied { bpf } for pid=2063 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.182000 audit: BPF prog-id=109 op=LOAD May 15 10:39:13.182000 audit[2063]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0002cbc88 items=0 ppid=2025 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.182000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132656365373439623135646566326363363333393730623931663765 May 15 10:39:13.195489 env[1199]: time="2025-05-15T10:39:13.195444623Z" level=info msg="StartContainer for \"12ece749b15def2cc633970b91f7e638a00a892ccbbee89a4e027d1abbfc5e81\" returns successfully" May 15 10:39:13.244385 env[1199]: time="2025-05-15T10:39:13.244334463Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-gt7qc,Uid:acb33c1d-320c-4203-9be5-304e6f036283,Namespace:tigera-operator,Attempt:0,}" May 15 10:39:13.250389 kubelet[1928]: E0515 10:39:13.250330 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:13.259874 kubelet[1928]: I0515 10:39:13.259815 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-ktfrv" podStartSLOduration=1.259778919 podStartE2EDuration="1.259778919s" podCreationTimestamp="2025-05-15 10:39:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:13.259387384 +0000 UTC m=+6.127073689" watchObservedRunningTime="2025-05-15 10:39:13.259778919 +0000 UTC m=+6.127465214" May 15 10:39:13.266333 env[1199]: time="2025-05-15T10:39:13.266125636Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:13.266333 env[1199]: time="2025-05-15T10:39:13.266242219Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:13.266333 env[1199]: time="2025-05-15T10:39:13.266266694Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:13.266867 env[1199]: time="2025-05-15T10:39:13.266731596Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e7aafcb855ee378665a0788c5170ff5704e559a5edaa51d0112094354ccb6898 pid=2107 runtime=io.containerd.runc.v2 May 15 10:39:13.278316 systemd[1]: Started cri-containerd-e7aafcb855ee378665a0788c5170ff5704e559a5edaa51d0112094354ccb6898.scope. May 15 10:39:13.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit: BPF prog-id=110 op=LOAD May 15 10:39:13.289000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.289000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2107 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.289000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616166636238353565653337383636356130373838633531373066 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2107 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616166636238353565653337383636356130373838633531373066 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit: BPF prog-id=111 op=LOAD May 15 10:39:13.290000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002cdce0 items=0 ppid=2107 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616166636238353565653337383636356130373838633531373066 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit: BPF prog-id=112 op=LOAD May 15 10:39:13.290000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002cdd28 items=0 ppid=2107 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616166636238353565653337383636356130373838633531373066 May 15 10:39:13.290000 audit: BPF prog-id=112 op=UNLOAD May 15 10:39:13.290000 audit: BPF prog-id=111 op=UNLOAD May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { perfmon } for pid=2116 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit[2116]: AVC avc: denied { bpf } for pid=2116 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:13.290000 audit: BPF prog-id=113 op=LOAD May 15 10:39:13.290000 audit[2116]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d2138 items=0 ppid=2107 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.290000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6537616166636238353565653337383636356130373838633531373066 May 15 10:39:13.314693 env[1199]: time="2025-05-15T10:39:13.314638693Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6f6897fdc5-gt7qc,Uid:acb33c1d-320c-4203-9be5-304e6f036283,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"e7aafcb855ee378665a0788c5170ff5704e559a5edaa51d0112094354ccb6898\"" May 15 10:39:13.316360 env[1199]: time="2025-05-15T10:39:13.316314895Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\"" May 15 10:39:13.368000 audit[2167]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.368000 audit[2167]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeade3a6d0 a2=0 a3=7ffeade3a6bc items=0 ppid=2074 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.368000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:39:13.369000 audit[2168]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2168 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.369000 audit[2168]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffef2daf60 a2=0 a3=7fffef2daf4c items=0 ppid=2074 pid=2168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.369000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 May 15 10:39:13.369000 audit[2169]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.369000 audit[2169]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffccd3fd6d0 a2=0 a3=7ffccd3fd6bc items=0 ppid=2074 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.369000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:39:13.370000 audit[2171]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2171 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.370000 audit[2171]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe3a05e8f0 a2=0 a3=7ffe3a05e8dc items=0 ppid=2074 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:39:13.371000 audit[2170]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2170 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.371000 audit[2170]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff2ff333e0 a2=0 a3=7fff2ff333cc items=0 ppid=2074 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.371000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 May 15 10:39:13.374000 audit[2172]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.374000 audit[2172]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffda65e6610 a2=0 a3=7ffda65e65fc items=0 ppid=2074 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.374000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 May 15 10:39:13.471000 audit[2173]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.471000 audit[2173]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc321510b0 a2=0 a3=7ffc3215109c items=0 ppid=2074 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.471000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:39:13.474000 audit[2175]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.474000 audit[2175]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffdda1263d0 a2=0 a3=7ffdda1263bc items=0 ppid=2074 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.474000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 May 15 10:39:13.477000 audit[2178]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.477000 audit[2178]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd8f6235d0 a2=0 a3=7ffd8f6235bc items=0 ppid=2074 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 May 15 10:39:13.478000 audit[2179]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.478000 audit[2179]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffde2f45570 a2=0 a3=7ffde2f4555c items=0 ppid=2074 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.478000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:39:13.480000 audit[2181]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.480000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4c4c81d0 a2=0 a3=7ffc4c4c81bc items=0 ppid=2074 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.480000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:39:13.481000 audit[2182]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.481000 audit[2182]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea3d0ef00 a2=0 a3=7ffea3d0eeec items=0 ppid=2074 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.481000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:39:13.483000 audit[2184]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.483000 audit[2184]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc4e939900 a2=0 a3=7ffc4e9398ec items=0 ppid=2074 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:39:13.486000 audit[2187]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2187 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.486000 audit[2187]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff05a6caf0 a2=0 a3=7fff05a6cadc items=0 ppid=2074 pid=2187 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.486000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 May 15 10:39:13.487000 audit[2188]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2188 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.487000 audit[2188]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd5f665940 a2=0 a3=7ffd5f66592c items=0 ppid=2074 pid=2188 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.487000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:39:13.489000 audit[2190]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2190 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.489000 audit[2190]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4a4d7f00 a2=0 a3=7ffc4a4d7eec items=0 ppid=2074 pid=2190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:39:13.489000 audit[2191]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2191 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.489000 audit[2191]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe56045430 a2=0 a3=7ffe5604541c items=0 ppid=2074 pid=2191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.489000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:39:13.491000 audit[2193]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.491000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd21755e30 a2=0 a3=7ffd21755e1c items=0 ppid=2074 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:39:13.494000 audit[2196]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.494000 audit[2196]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffd64287b0 a2=0 a3=7fffd642879c items=0 ppid=2074 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:39:13.497000 audit[2199]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2199 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.497000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffff08464d0 a2=0 a3=7ffff08464bc items=0 ppid=2074 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:39:13.498000 audit[2200]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.498000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffcdf51b060 a2=0 a3=7ffcdf51b04c items=0 ppid=2074 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.498000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:39:13.500000 audit[2202]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.500000 audit[2202]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffc442c6e0 a2=0 a3=7fffc442c6cc items=0 ppid=2074 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.500000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:39:13.502000 audit[2205]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2205 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.502000 audit[2205]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffeef627610 a2=0 a3=7ffeef6275fc items=0 ppid=2074 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:39:13.503000 audit[2206]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.503000 audit[2206]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeaf76dd70 a2=0 a3=7ffeaf76dd5c items=0 ppid=2074 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:39:13.505000 audit[2208]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2208 subj=system_u:system_r:kernel_t:s0 comm="iptables" May 15 10:39:13.505000 audit[2208]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc9606d540 a2=0 a3=7ffc9606d52c items=0 ppid=2074 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:39:13.526000 audit[2214]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:13.526000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffc632868d0 a2=0 a3=7ffc632868bc items=0 ppid=2074 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.526000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:13.535000 audit[2214]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:13.535000 audit[2214]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc632868d0 a2=0 a3=7ffc632868bc items=0 ppid=2074 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.535000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:13.536000 audit[2219]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2219 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.536000 audit[2219]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fff07f058a0 a2=0 a3=7fff07f0588c items=0 ppid=2074 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 May 15 10:39:13.538000 audit[2221]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2221 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.538000 audit[2221]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe766c6fb0 a2=0 a3=7ffe766c6f9c items=0 ppid=2074 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 May 15 10:39:13.541000 audit[2224]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.541000 audit[2224]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe9b9a4390 a2=0 a3=7ffe9b9a437c items=0 ppid=2074 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.541000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 May 15 10:39:13.542000 audit[2225]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.542000 audit[2225]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdabbf66e0 a2=0 a3=7ffdabbf66cc items=0 ppid=2074 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 May 15 10:39:13.544000 audit[2227]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.544000 audit[2227]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc4ce2c4c0 a2=0 a3=7ffc4ce2c4ac items=0 ppid=2074 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 May 15 10:39:13.544000 audit[2228]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.544000 audit[2228]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe093334a0 a2=0 a3=7ffe0933348c items=0 ppid=2074 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 May 15 10:39:13.546000 audit[2230]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.546000 audit[2230]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff3f682fd0 a2=0 a3=7fff3f682fbc items=0 ppid=2074 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 May 15 10:39:13.549000 audit[2233]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.549000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffea8492ad0 a2=0 a3=7ffea8492abc items=0 ppid=2074 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D May 15 10:39:13.550000 audit[2234]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.550000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffff68e37b0 a2=0 a3=7ffff68e379c items=0 ppid=2074 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.550000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 May 15 10:39:13.552000 audit[2236]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.552000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffca62e1b00 a2=0 a3=7ffca62e1aec items=0 ppid=2074 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 May 15 10:39:13.553000 audit[2237]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.553000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd617b2d0 a2=0 a3=7ffdd617b2bc items=0 ppid=2074 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 May 15 10:39:13.555000 audit[2239]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.555000 audit[2239]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffda4910580 a2=0 a3=7ffda491056c items=0 ppid=2074 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A May 15 10:39:13.558000 audit[2242]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.558000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc2209e430 a2=0 a3=7ffc2209e41c items=0 ppid=2074 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D May 15 10:39:13.561000 audit[2245]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.561000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca4509050 a2=0 a3=7ffca450903c items=0 ppid=2074 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C May 15 10:39:13.562000 audit[2246]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.562000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe51d60560 a2=0 a3=7ffe51d6054c items=0 ppid=2074 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.562000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 May 15 10:39:13.564000 audit[2248]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.564000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff8a99a5c0 a2=0 a3=7fff8a99a5ac items=0 ppid=2074 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:39:13.566000 audit[2251]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.566000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffcbd408550 a2=0 a3=7ffcbd40853c items=0 ppid=2074 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 May 15 10:39:13.567000 audit[2252]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.567000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff8ac71070 a2=0 a3=7fff8ac7105c items=0 ppid=2074 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.567000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 May 15 10:39:13.569000 audit[2254]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.569000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe2bf497c0 a2=0 a3=7ffe2bf497ac items=0 ppid=2074 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 May 15 10:39:13.570000 audit[2255]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2255 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.570000 audit[2255]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe34c83e80 a2=0 a3=7ffe34c83e6c items=0 ppid=2074 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 May 15 10:39:13.571000 audit[2257]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.571000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcc1192180 a2=0 a3=7ffcc119216c items=0 ppid=2074 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.571000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:39:13.574000 audit[2260]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" May 15 10:39:13.574000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdf067d110 a2=0 a3=7ffdf067d0fc items=0 ppid=2074 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C May 15 10:39:13.577000 audit[2262]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:39:13.577000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7ffe712798a0 a2=0 a3=7ffe7127988c items=0 ppid=2074 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.577000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:13.577000 audit[2262]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" May 15 10:39:13.577000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe712798a0 a2=0 a3=7ffe7127988c items=0 ppid=2074 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:13.577000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:13.983843 systemd[1]: run-containerd-runc-k8s.io-f7caa3a4ea91ae724967f67c7e4815273b22fdb0769ffaabfe97697f37e03a52-runc.dDLvtW.mount: Deactivated successfully. May 15 10:39:16.484443 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3733845418.mount: Deactivated successfully. May 15 10:39:18.123339 kubelet[1928]: E0515 10:39:18.123261 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:18.346568 env[1199]: time="2025-05-15T10:39:18.346521054Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:18.348536 env[1199]: time="2025-05-15T10:39:18.348487520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:18.350048 env[1199]: time="2025-05-15T10:39:18.350009923Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:18.351449 env[1199]: time="2025-05-15T10:39:18.351412977Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:a4a44422d8f2a14e0aaea2031ccb5580f2bf68218c9db444450c1888743305e9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:18.351855 env[1199]: time="2025-05-15T10:39:18.351831976Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.7\" returns image reference \"sha256:e9b19fa62f476f04e5840eb65a0f71b49c7b9f4ceede31675409ddc218bb5578\"" May 15 10:39:18.353645 env[1199]: time="2025-05-15T10:39:18.353616097Z" level=info msg="CreateContainer within sandbox \"e7aafcb855ee378665a0788c5170ff5704e559a5edaa51d0112094354ccb6898\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" May 15 10:39:18.365920 env[1199]: time="2025-05-15T10:39:18.365867266Z" level=info msg="CreateContainer within sandbox \"e7aafcb855ee378665a0788c5170ff5704e559a5edaa51d0112094354ccb6898\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"af7c268ff9a04b30fe01f49728df89c4ac6a76401120ee94e1569d04cd2befae\"" May 15 10:39:18.366435 env[1199]: time="2025-05-15T10:39:18.366386903Z" level=info msg="StartContainer for \"af7c268ff9a04b30fe01f49728df89c4ac6a76401120ee94e1569d04cd2befae\"" May 15 10:39:18.383705 systemd[1]: Started cri-containerd-af7c268ff9a04b30fe01f49728df89c4ac6a76401120ee94e1569d04cd2befae.scope. May 15 10:39:18.395837 kernel: kauditd_printk_skb: 317 callbacks suppressed May 15 10:39:18.395962 kernel: audit: type=1400 audit(1747305558.392:896): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.400395 kernel: audit: type=1400 audit(1747305558.392:897): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.400440 kernel: audit: type=1400 audit(1747305558.392:898): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.407261 kernel: audit: type=1400 audit(1747305558.392:899): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.407331 kernel: audit: type=1400 audit(1747305558.392:900): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.413901 kernel: audit: type=1400 audit(1747305558.392:901): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.413948 kernel: audit: type=1400 audit(1747305558.392:902): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.420839 kernel: audit: type=1400 audit(1747305558.392:903): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.420900 kernel: audit: type=1400 audit(1747305558.392:904): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.427784 kernel: audit: type=1400 audit(1747305558.396:905): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit: BPF prog-id=114 op=LOAD May 15 10:39:18.396000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2107 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:18.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376332363866663961303462333066653031663439373238646638 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2107 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:18.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376332363866663961303462333066653031663439373238646638 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.396000 audit: BPF prog-id=115 op=LOAD May 15 10:39:18.396000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000312750 items=0 ppid=2107 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:18.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376332363866663961303462333066653031663439373238646638 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.399000 audit: BPF prog-id=116 op=LOAD May 15 10:39:18.399000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000312798 items=0 ppid=2107 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:18.399000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376332363866663961303462333066653031663439373238646638 May 15 10:39:18.402000 audit: BPF prog-id=116 op=UNLOAD May 15 10:39:18.402000 audit: BPF prog-id=115 op=UNLOAD May 15 10:39:18.402000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { perfmon } for pid=2271 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit[2271]: AVC avc: denied { bpf } for pid=2271 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:18.402000 audit: BPF prog-id=117 op=LOAD May 15 10:39:18.402000 audit[2271]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000312ba8 items=0 ppid=2107 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:18.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166376332363866663961303462333066653031663439373238646638 May 15 10:39:18.434567 env[1199]: time="2025-05-15T10:39:18.434516373Z" level=info msg="StartContainer for \"af7c268ff9a04b30fe01f49728df89c4ac6a76401120ee94e1569d04cd2befae\" returns successfully" May 15 10:39:18.979372 kubelet[1928]: E0515 10:39:18.979343 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:19.674958 kubelet[1928]: E0515 10:39:19.674925 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:19.683469 kubelet[1928]: I0515 10:39:19.683408 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6f6897fdc5-gt7qc" podStartSLOduration=2.646781844 podStartE2EDuration="7.683388836s" podCreationTimestamp="2025-05-15 10:39:12 +0000 UTC" firstStartedPulling="2025-05-15 10:39:13.315921726 +0000 UTC m=+6.183608031" lastFinishedPulling="2025-05-15 10:39:18.352528718 +0000 UTC m=+11.220215023" observedRunningTime="2025-05-15 10:39:19.269764959 +0000 UTC m=+12.137451284" watchObservedRunningTime="2025-05-15 10:39:19.683388836 +0000 UTC m=+12.551075161" May 15 10:39:21.165000 audit[2304]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:21.165000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffeb307520 a2=0 a3=7fffeb30750c items=0 ppid=2074 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.165000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:21.171000 audit[2304]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:21.171000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffeb307520 a2=0 a3=0 items=0 ppid=2074 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:21.182000 audit[2306]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:21.182000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd351b1740 a2=0 a3=7ffd351b172c items=0 ppid=2074 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:21.186000 audit[2306]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:21.186000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd351b1740 a2=0 a3=0 items=0 ppid=2074 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.186000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:21.387574 systemd[1]: Created slice kubepods-besteffort-pod6d543253_4451_45ae_9e0d_75d09b59e207.slice. May 15 10:39:21.393765 systemd[1]: Created slice kubepods-besteffort-pod306656da_c597_44f1_a0da_4ab9ae8205f5.slice. May 15 10:39:21.428463 kubelet[1928]: I0515 10:39:21.428327 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-flexvol-driver-host\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.428463 kubelet[1928]: I0515 10:39:21.428368 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/306656da-c597-44f1-a0da-4ab9ae8205f5-tigera-ca-bundle\") pod \"calico-typha-c95d55c78-mxcvp\" (UID: \"306656da-c597-44f1-a0da-4ab9ae8205f5\") " pod="calico-system/calico-typha-c95d55c78-mxcvp" May 15 10:39:21.428463 kubelet[1928]: I0515 10:39:21.428386 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-var-run-calico\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.428463 kubelet[1928]: I0515 10:39:21.428402 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-cni-log-dir\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.428463 kubelet[1928]: I0515 10:39:21.428432 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-xtables-lock\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429013 kubelet[1928]: I0515 10:39:21.428447 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-cni-net-dir\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429013 kubelet[1928]: I0515 10:39:21.428474 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/6d543253-4451-45ae-9e0d-75d09b59e207-node-certs\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429013 kubelet[1928]: I0515 10:39:21.428499 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-cni-bin-dir\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429013 kubelet[1928]: I0515 10:39:21.428514 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m6846\" (UniqueName: \"kubernetes.io/projected/306656da-c597-44f1-a0da-4ab9ae8205f5-kube-api-access-m6846\") pod \"calico-typha-c95d55c78-mxcvp\" (UID: \"306656da-c597-44f1-a0da-4ab9ae8205f5\") " pod="calico-system/calico-typha-c95d55c78-mxcvp" May 15 10:39:21.429013 kubelet[1928]: I0515 10:39:21.428533 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-lib-modules\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429166 kubelet[1928]: I0515 10:39:21.428546 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-var-lib-calico\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429166 kubelet[1928]: I0515 10:39:21.428559 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fxk5d\" (UniqueName: \"kubernetes.io/projected/6d543253-4451-45ae-9e0d-75d09b59e207-kube-api-access-fxk5d\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429166 kubelet[1928]: I0515 10:39:21.428576 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/6d543253-4451-45ae-9e0d-75d09b59e207-policysync\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429166 kubelet[1928]: I0515 10:39:21.428594 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6d543253-4451-45ae-9e0d-75d09b59e207-tigera-ca-bundle\") pod \"calico-node-pxtr4\" (UID: \"6d543253-4451-45ae-9e0d-75d09b59e207\") " pod="calico-system/calico-node-pxtr4" May 15 10:39:21.429166 kubelet[1928]: I0515 10:39:21.428613 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/306656da-c597-44f1-a0da-4ab9ae8205f5-typha-certs\") pod \"calico-typha-c95d55c78-mxcvp\" (UID: \"306656da-c597-44f1-a0da-4ab9ae8205f5\") " pod="calico-system/calico-typha-c95d55c78-mxcvp" May 15 10:39:21.446950 kubelet[1928]: E0515 10:39:21.446860 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:21.529236 kubelet[1928]: I0515 10:39:21.529181 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/7e870772-eaea-4b50-ab85-65106d357121-varrun\") pod \"csi-node-driver-9psfb\" (UID: \"7e870772-eaea-4b50-ab85-65106d357121\") " pod="calico-system/csi-node-driver-9psfb" May 15 10:39:21.529569 kubelet[1928]: I0515 10:39:21.529529 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/7e870772-eaea-4b50-ab85-65106d357121-socket-dir\") pod \"csi-node-driver-9psfb\" (UID: \"7e870772-eaea-4b50-ab85-65106d357121\") " pod="calico-system/csi-node-driver-9psfb" May 15 10:39:21.529745 kubelet[1928]: I0515 10:39:21.529673 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/7e870772-eaea-4b50-ab85-65106d357121-registration-dir\") pod \"csi-node-driver-9psfb\" (UID: \"7e870772-eaea-4b50-ab85-65106d357121\") " pod="calico-system/csi-node-driver-9psfb" May 15 10:39:21.529776 kubelet[1928]: I0515 10:39:21.529740 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/7e870772-eaea-4b50-ab85-65106d357121-kubelet-dir\") pod \"csi-node-driver-9psfb\" (UID: \"7e870772-eaea-4b50-ab85-65106d357121\") " pod="calico-system/csi-node-driver-9psfb" May 15 10:39:21.529847 kubelet[1928]: I0515 10:39:21.529794 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d5bql\" (UniqueName: \"kubernetes.io/projected/7e870772-eaea-4b50-ab85-65106d357121-kube-api-access-d5bql\") pod \"csi-node-driver-9psfb\" (UID: \"7e870772-eaea-4b50-ab85-65106d357121\") " pod="calico-system/csi-node-driver-9psfb" May 15 10:39:21.530470 kubelet[1928]: E0515 10:39:21.530450 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.530470 kubelet[1928]: W0515 10:39:21.530468 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.530560 kubelet[1928]: E0515 10:39:21.530500 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.530675 kubelet[1928]: E0515 10:39:21.530662 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.530759 kubelet[1928]: W0515 10:39:21.530740 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.530759 kubelet[1928]: E0515 10:39:21.530759 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.530946 kubelet[1928]: E0515 10:39:21.530919 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.530946 kubelet[1928]: W0515 10:39:21.530945 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.531033 kubelet[1928]: E0515 10:39:21.530954 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.531097 kubelet[1928]: E0515 10:39:21.531085 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.531097 kubelet[1928]: W0515 10:39:21.531094 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.531179 kubelet[1928]: E0515 10:39:21.531102 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.538171 kubelet[1928]: E0515 10:39:21.538142 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.538171 kubelet[1928]: W0515 10:39:21.538166 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.538332 kubelet[1928]: E0515 10:39:21.538185 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.538626 kubelet[1928]: E0515 10:39:21.538613 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.538626 kubelet[1928]: W0515 10:39:21.538625 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.538718 kubelet[1928]: E0515 10:39:21.538640 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.538911 kubelet[1928]: E0515 10:39:21.538885 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.538977 kubelet[1928]: W0515 10:39:21.538911 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.538977 kubelet[1928]: E0515 10:39:21.538960 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.539152 kubelet[1928]: E0515 10:39:21.539136 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.539152 kubelet[1928]: W0515 10:39:21.539149 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.539217 kubelet[1928]: E0515 10:39:21.539177 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.539381 kubelet[1928]: E0515 10:39:21.539364 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.539381 kubelet[1928]: W0515 10:39:21.539377 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.539453 kubelet[1928]: E0515 10:39:21.539403 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.539551 kubelet[1928]: E0515 10:39:21.539535 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.539551 kubelet[1928]: W0515 10:39:21.539547 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.539619 kubelet[1928]: E0515 10:39:21.539572 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.539729 kubelet[1928]: E0515 10:39:21.539712 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.539729 kubelet[1928]: W0515 10:39:21.539725 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.539815 kubelet[1928]: E0515 10:39:21.539749 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.539934 kubelet[1928]: E0515 10:39:21.539917 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.539934 kubelet[1928]: W0515 10:39:21.539929 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.540008 kubelet[1928]: E0515 10:39:21.539953 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.540099 kubelet[1928]: E0515 10:39:21.540083 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.540099 kubelet[1928]: W0515 10:39:21.540094 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.540172 kubelet[1928]: E0515 10:39:21.540117 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.540261 kubelet[1928]: E0515 10:39:21.540244 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.540261 kubelet[1928]: W0515 10:39:21.540256 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.540324 kubelet[1928]: E0515 10:39:21.540278 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.540423 kubelet[1928]: E0515 10:39:21.540407 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.540423 kubelet[1928]: W0515 10:39:21.540419 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.540494 kubelet[1928]: E0515 10:39:21.540440 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.540635 kubelet[1928]: E0515 10:39:21.540618 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.540635 kubelet[1928]: W0515 10:39:21.540630 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.540741 kubelet[1928]: E0515 10:39:21.540654 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.540887 kubelet[1928]: E0515 10:39:21.540871 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.540887 kubelet[1928]: W0515 10:39:21.540883 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.540959 kubelet[1928]: E0515 10:39:21.540900 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.541102 kubelet[1928]: E0515 10:39:21.541083 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.541102 kubelet[1928]: W0515 10:39:21.541094 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.541146 kubelet[1928]: E0515 10:39:21.541104 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.541245 kubelet[1928]: E0515 10:39:21.541232 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.542510 kubelet[1928]: W0515 10:39:21.541241 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.542510 kubelet[1928]: E0515 10:39:21.542503 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.542757 kubelet[1928]: E0515 10:39:21.542736 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.542876 kubelet[1928]: W0515 10:39:21.542859 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.543063 kubelet[1928]: E0515 10:39:21.543038 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.543817 kubelet[1928]: E0515 10:39:21.543794 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.543899 kubelet[1928]: W0515 10:39:21.543884 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.544021 kubelet[1928]: E0515 10:39:21.544010 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.544241 kubelet[1928]: E0515 10:39:21.544232 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.544313 kubelet[1928]: W0515 10:39:21.544298 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.544440 kubelet[1928]: E0515 10:39:21.544429 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.544561 kubelet[1928]: E0515 10:39:21.544532 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.544662 kubelet[1928]: W0515 10:39:21.544648 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.544838 kubelet[1928]: E0515 10:39:21.544825 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.545049 kubelet[1928]: E0515 10:39:21.545038 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.545172 kubelet[1928]: W0515 10:39:21.545133 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.545357 kubelet[1928]: E0515 10:39:21.545341 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.545488 kubelet[1928]: E0515 10:39:21.545477 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.545757 kubelet[1928]: W0515 10:39:21.545736 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.545824 kubelet[1928]: E0515 10:39:21.545784 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.545906 kubelet[1928]: E0515 10:39:21.545893 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.545906 kubelet[1928]: W0515 10:39:21.545904 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.545975 kubelet[1928]: E0515 10:39:21.545927 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.546052 kubelet[1928]: E0515 10:39:21.546042 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.546052 kubelet[1928]: W0515 10:39:21.546050 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.546123 kubelet[1928]: E0515 10:39:21.546112 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.546241 kubelet[1928]: E0515 10:39:21.546232 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.546241 kubelet[1928]: W0515 10:39:21.546242 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.546307 kubelet[1928]: E0515 10:39:21.546288 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.546417 kubelet[1928]: E0515 10:39:21.546407 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.546417 kubelet[1928]: W0515 10:39:21.546415 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.546489 kubelet[1928]: E0515 10:39:21.546423 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.546598 kubelet[1928]: E0515 10:39:21.546588 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.546598 kubelet[1928]: W0515 10:39:21.546596 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.546664 kubelet[1928]: E0515 10:39:21.546605 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.546785 kubelet[1928]: E0515 10:39:21.546775 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.546785 kubelet[1928]: W0515 10:39:21.546783 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.546882 kubelet[1928]: E0515 10:39:21.546793 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.549169 kubelet[1928]: E0515 10:39:21.549150 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.549169 kubelet[1928]: W0515 10:39:21.549166 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.549243 kubelet[1928]: E0515 10:39:21.549174 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.551872 kubelet[1928]: E0515 10:39:21.551855 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.551977 kubelet[1928]: W0515 10:39:21.551962 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.552068 kubelet[1928]: E0515 10:39:21.552052 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.552227 kubelet[1928]: E0515 10:39:21.552186 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.552227 kubelet[1928]: W0515 10:39:21.552192 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.552227 kubelet[1928]: E0515 10:39:21.552200 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.630598 kubelet[1928]: E0515 10:39:21.630551 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.630598 kubelet[1928]: W0515 10:39:21.630577 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.630598 kubelet[1928]: E0515 10:39:21.630596 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.630842 kubelet[1928]: E0515 10:39:21.630779 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.630842 kubelet[1928]: W0515 10:39:21.630786 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.630842 kubelet[1928]: E0515 10:39:21.630823 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.630996 kubelet[1928]: E0515 10:39:21.630982 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.630996 kubelet[1928]: W0515 10:39:21.630992 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.631065 kubelet[1928]: E0515 10:39:21.631004 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.631317 kubelet[1928]: E0515 10:39:21.631288 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.631345 kubelet[1928]: W0515 10:39:21.631311 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.631345 kubelet[1928]: E0515 10:39:21.631338 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.631482 kubelet[1928]: E0515 10:39:21.631464 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.631482 kubelet[1928]: W0515 10:39:21.631472 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.631482 kubelet[1928]: E0515 10:39:21.631482 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.631599 kubelet[1928]: E0515 10:39:21.631587 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.631599 kubelet[1928]: W0515 10:39:21.631594 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.631660 kubelet[1928]: E0515 10:39:21.631605 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.631766 kubelet[1928]: E0515 10:39:21.631754 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.631766 kubelet[1928]: W0515 10:39:21.631762 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.631861 kubelet[1928]: E0515 10:39:21.631773 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.631954 kubelet[1928]: E0515 10:39:21.631933 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.631954 kubelet[1928]: W0515 10:39:21.631945 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.632000 kubelet[1928]: E0515 10:39:21.631957 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.632104 kubelet[1928]: E0515 10:39:21.632095 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.632127 kubelet[1928]: W0515 10:39:21.632104 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.632127 kubelet[1928]: E0515 10:39:21.632115 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.632279 kubelet[1928]: E0515 10:39:21.632268 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.632279 kubelet[1928]: W0515 10:39:21.632276 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.632346 kubelet[1928]: E0515 10:39:21.632304 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.632421 kubelet[1928]: E0515 10:39:21.632406 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.632421 kubelet[1928]: W0515 10:39:21.632420 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.632482 kubelet[1928]: E0515 10:39:21.632446 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.632590 kubelet[1928]: E0515 10:39:21.632578 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.632590 kubelet[1928]: W0515 10:39:21.632585 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.632652 kubelet[1928]: E0515 10:39:21.632598 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.632742 kubelet[1928]: E0515 10:39:21.632733 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.632742 kubelet[1928]: W0515 10:39:21.632740 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.632790 kubelet[1928]: E0515 10:39:21.632750 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.632951 kubelet[1928]: E0515 10:39:21.632935 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.632951 kubelet[1928]: W0515 10:39:21.632947 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.633022 kubelet[1928]: E0515 10:39:21.632961 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.633111 kubelet[1928]: E0515 10:39:21.633099 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.633111 kubelet[1928]: W0515 10:39:21.633107 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.633177 kubelet[1928]: E0515 10:39:21.633117 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.633253 kubelet[1928]: E0515 10:39:21.633241 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.633253 kubelet[1928]: W0515 10:39:21.633250 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.633323 kubelet[1928]: E0515 10:39:21.633263 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.633459 kubelet[1928]: E0515 10:39:21.633446 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.633459 kubelet[1928]: W0515 10:39:21.633456 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.633527 kubelet[1928]: E0515 10:39:21.633469 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.633624 kubelet[1928]: E0515 10:39:21.633610 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.633624 kubelet[1928]: W0515 10:39:21.633621 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.633704 kubelet[1928]: E0515 10:39:21.633632 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.633786 kubelet[1928]: E0515 10:39:21.633776 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.633786 kubelet[1928]: W0515 10:39:21.633784 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.633879 kubelet[1928]: E0515 10:39:21.633818 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.633907 kubelet[1928]: E0515 10:39:21.633904 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.633929 kubelet[1928]: W0515 10:39:21.633909 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.634004 kubelet[1928]: E0515 10:39:21.633983 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.634142 kubelet[1928]: E0515 10:39:21.634126 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.634142 kubelet[1928]: W0515 10:39:21.634137 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.634230 kubelet[1928]: E0515 10:39:21.634192 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.634350 kubelet[1928]: E0515 10:39:21.634316 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.634350 kubelet[1928]: W0515 10:39:21.634330 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.634350 kubelet[1928]: E0515 10:39:21.634350 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.634581 kubelet[1928]: E0515 10:39:21.634567 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.634629 kubelet[1928]: W0515 10:39:21.634582 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.634629 kubelet[1928]: E0515 10:39:21.634605 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.634943 kubelet[1928]: E0515 10:39:21.634920 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.634943 kubelet[1928]: W0515 10:39:21.634942 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.635035 kubelet[1928]: E0515 10:39:21.634953 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.635173 kubelet[1928]: E0515 10:39:21.635145 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.635173 kubelet[1928]: W0515 10:39:21.635157 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.635173 kubelet[1928]: E0515 10:39:21.635165 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.641494 kubelet[1928]: E0515 10:39:21.641480 1928 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input May 15 10:39:21.641494 kubelet[1928]: W0515 10:39:21.641491 1928 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" May 15 10:39:21.641573 kubelet[1928]: E0515 10:39:21.641501 1928 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" May 15 10:39:21.693006 kubelet[1928]: E0515 10:39:21.692885 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:21.693978 env[1199]: time="2025-05-15T10:39:21.693459643Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pxtr4,Uid:6d543253-4451-45ae-9e0d-75d09b59e207,Namespace:calico-system,Attempt:0,}" May 15 10:39:21.698013 kubelet[1928]: E0515 10:39:21.697982 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:21.698480 env[1199]: time="2025-05-15T10:39:21.698428481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-c95d55c78-mxcvp,Uid:306656da-c597-44f1-a0da-4ab9ae8205f5,Namespace:calico-system,Attempt:0,}" May 15 10:39:21.731988 env[1199]: time="2025-05-15T10:39:21.731821621Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:21.731988 env[1199]: time="2025-05-15T10:39:21.731865324Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:21.731988 env[1199]: time="2025-05-15T10:39:21.731878051Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:21.732210 env[1199]: time="2025-05-15T10:39:21.732026586Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa pid=2379 runtime=io.containerd.runc.v2 May 15 10:39:21.740964 env[1199]: time="2025-05-15T10:39:21.740896662Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:21.740964 env[1199]: time="2025-05-15T10:39:21.740939683Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:21.740964 env[1199]: time="2025-05-15T10:39:21.740952811Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:21.741201 env[1199]: time="2025-05-15T10:39:21.741159200Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4758a822224690d80026e042f0327ab5834a8bc651f2b5287eacddd285897669 pid=2399 runtime=io.containerd.runc.v2 May 15 10:39:21.752041 systemd[1]: Started cri-containerd-c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa.scope. May 15 10:39:21.756479 systemd[1]: Started cri-containerd-4758a822224690d80026e042f0327ab5834a8bc651f2b5287eacddd285897669.scope. May 15 10:39:21.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.763000 audit: BPF prog-id=118 op=LOAD May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2379 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330356266396464653838656532323035643835663133646431663337 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2379 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330356266396464653838656532323035643835663133646431663337 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit: BPF prog-id=119 op=LOAD May 15 10:39:21.764000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000265d90 items=0 ppid=2379 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330356266396464653838656532323035643835663133646431663337 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit: BPF prog-id=120 op=LOAD May 15 10:39:21.764000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000265dd8 items=0 ppid=2379 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330356266396464653838656532323035643835663133646431663337 May 15 10:39:21.764000 audit: BPF prog-id=120 op=UNLOAD May 15 10:39:21.764000 audit: BPF prog-id=119 op=UNLOAD May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { perfmon } for pid=2389 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit[2389]: AVC avc: denied { bpf } for pid=2389 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.764000 audit: BPF prog-id=121 op=LOAD May 15 10:39:21.764000 audit[2389]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003401e8 items=0 ppid=2379 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.764000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330356266396464653838656532323035643835663133646431663337 May 15 10:39:21.779060 env[1199]: time="2025-05-15T10:39:21.778988185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pxtr4,Uid:6d543253-4451-45ae-9e0d-75d09b59e207,Namespace:calico-system,Attempt:0,} returns sandbox id \"c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa\"" May 15 10:39:21.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.779000 audit: BPF prog-id=122 op=LOAD May 15 10:39:21.781086 env[1199]: time="2025-05-15T10:39:21.780548022Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\"" May 15 10:39:21.781133 kubelet[1928]: E0515 10:39:21.779591 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:21.780000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.780000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.780000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353861383232323234363930643830303236653034326630333237 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353861383232323234363930643830303236653034326630333237 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.781000 audit: BPF prog-id=123 op=LOAD May 15 10:39:21.781000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00028ac50 items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353861383232323234363930643830303236653034326630333237 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.782000 audit: BPF prog-id=124 op=LOAD May 15 10:39:21.782000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00028ac98 items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.782000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353861383232323234363930643830303236653034326630333237 May 15 10:39:21.782000 audit: BPF prog-id=124 op=UNLOAD May 15 10:39:21.783000 audit: BPF prog-id=123 op=UNLOAD May 15 10:39:21.783000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { perfmon } for pid=2409 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit[2409]: AVC avc: denied { bpf } for pid=2409 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:21.783000 audit: BPF prog-id=125 op=LOAD May 15 10:39:21.783000 audit[2409]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00028b0a8 items=0 ppid=2399 pid=2409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:21.783000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437353861383232323234363930643830303236653034326630333237 May 15 10:39:21.808037 env[1199]: time="2025-05-15T10:39:21.807987039Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-c95d55c78-mxcvp,Uid:306656da-c597-44f1-a0da-4ab9ae8205f5,Namespace:calico-system,Attempt:0,} returns sandbox id \"4758a822224690d80026e042f0327ab5834a8bc651f2b5287eacddd285897669\"" May 15 10:39:21.808780 kubelet[1928]: E0515 10:39:21.808736 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:22.200000 audit[2455]: NETFILTER_CFG table=filter:93 family=2 entries=17 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:22.200000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffe17420a80 a2=0 a3=7ffe17420a6c items=0 ppid=2074 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:22.200000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:22.204000 audit[2455]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2455 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:22.204000 audit[2455]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe17420a80 a2=0 a3=0 items=0 ppid=2074 pid=2455 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:22.204000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:23.103902 update_engine[1188]: I0515 10:39:23.103863 1188 update_attempter.cc:509] Updating boot flags... May 15 10:39:23.231996 kubelet[1928]: E0515 10:39:23.231943 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:24.426882 env[1199]: time="2025-05-15T10:39:24.426816292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:24.429325 env[1199]: time="2025-05-15T10:39:24.429278492Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:24.430992 env[1199]: time="2025-05-15T10:39:24.430953426Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:24.433267 env[1199]: time="2025-05-15T10:39:24.433237814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:eeaa2bb4f9b1aa61adde43ce6dea95eee89291f96963548e108d9a2dfbc5edd1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:24.433615 env[1199]: time="2025-05-15T10:39:24.433587444Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.3\" returns image reference \"sha256:0ceddb3add2e9955cbb604f666245e259f30b1d6683c428f8748359e83d238a5\"" May 15 10:39:24.435481 env[1199]: time="2025-05-15T10:39:24.435451954Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\"" May 15 10:39:24.436345 env[1199]: time="2025-05-15T10:39:24.436285187Z" level=info msg="CreateContainer within sandbox \"c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" May 15 10:39:24.454130 env[1199]: time="2025-05-15T10:39:24.454065366Z" level=info msg="CreateContainer within sandbox \"c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74\"" May 15 10:39:24.454691 env[1199]: time="2025-05-15T10:39:24.454654177Z" level=info msg="StartContainer for \"736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74\"" May 15 10:39:24.473510 systemd[1]: run-containerd-runc-k8s.io-736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74-runc.kqbuUf.mount: Deactivated successfully. May 15 10:39:24.475151 systemd[1]: Started cri-containerd-736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74.scope. May 15 10:39:24.498311 kernel: kauditd_printk_skb: 179 callbacks suppressed May 15 10:39:24.498449 kernel: audit: type=1400 audit(1747305564.487:956): avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.498471 kernel: audit: type=1300 audit(1747305564.487:956): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4a25b820a8 items=0 ppid=2379 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:24.487000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f4a25b820a8 items=0 ppid=2379 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:24.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363534366332353637643630313966386439396337393064656566 May 15 10:39:24.502834 kernel: audit: type=1327 audit(1747305564.487:956): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363534366332353637643630313966386439396337393064656566 May 15 10:39:24.502913 kernel: audit: type=1400 audit(1747305564.487:957): avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.508774 kernel: audit: type=1400 audit(1747305564.487:957): avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.514846 kernel: audit: type=1400 audit(1747305564.487:957): avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.514919 kernel: audit: type=1400 audit(1747305564.487:957): avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.514936 kernel: audit: type=1400 audit(1747305564.487:957): avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.518987 env[1199]: time="2025-05-15T10:39:24.518940987Z" level=info msg="StartContainer for \"736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74\" returns successfully" May 15 10:39:24.521012 kernel: audit: type=1400 audit(1747305564.487:957): avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.521062 kernel: audit: type=1400 audit(1747305564.487:957): avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.487000 audit: BPF prog-id=126 op=LOAD May 15 10:39:24.487000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001f9718 items=0 ppid=2379 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:24.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363534366332353637643630313966386439396337393064656566 May 15 10:39:24.492000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.492000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.492000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.492000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.492000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.492000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.492000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.524750 systemd[1]: cri-containerd-736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74.scope: Deactivated successfully. May 15 10:39:24.492000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.492000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.492000 audit: BPF prog-id=127 op=LOAD May 15 10:39:24.492000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001f9768 items=0 ppid=2379 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:24.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363534366332353637643630313966386439396337393064656566 May 15 10:39:24.497000 audit: BPF prog-id=127 op=UNLOAD May 15 10:39:24.497000 audit: BPF prog-id=126 op=UNLOAD May 15 10:39:24.497000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { perfmon } for pid=2478 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit[2478]: AVC avc: denied { bpf } for pid=2478 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:24.497000 audit: BPF prog-id=128 op=LOAD May 15 10:39:24.497000 audit[2478]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001f97f8 items=0 ppid=2379 pid=2478 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:24.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733363534366332353637643630313966386439396337393064656566 May 15 10:39:24.528000 audit: BPF prog-id=128 op=UNLOAD May 15 10:39:25.231452 kubelet[1928]: E0515 10:39:25.231396 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:25.273081 kubelet[1928]: E0515 10:39:25.273044 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:25.289372 env[1199]: time="2025-05-15T10:39:25.289323109Z" level=info msg="shim disconnected" id=736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74 May 15 10:39:25.289372 env[1199]: time="2025-05-15T10:39:25.289363954Z" level=warning msg="cleaning up after shim disconnected" id=736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74 namespace=k8s.io May 15 10:39:25.289372 env[1199]: time="2025-05-15T10:39:25.289372352Z" level=info msg="cleaning up dead shim" May 15 10:39:25.298848 env[1199]: time="2025-05-15T10:39:25.298814402Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:25Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2517 runtime=io.containerd.runc.v2\n" May 15 10:39:25.449233 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-736546c2567d6019f8d99c790deef381e038dc4a172f62b3c832389b417bdc74-rootfs.mount: Deactivated successfully. May 15 10:39:26.276021 kubelet[1928]: E0515 10:39:26.275965 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:27.231569 kubelet[1928]: E0515 10:39:27.231503 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:28.631760 env[1199]: time="2025-05-15T10:39:28.631714164Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:28.634430 env[1199]: time="2025-05-15T10:39:28.634391102Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:28.637124 env[1199]: time="2025-05-15T10:39:28.637088954Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:28.639504 env[1199]: time="2025-05-15T10:39:28.639471789Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:f5516aa6a78f00931d2625f3012dcf2c69d141ce41483b8d59c6ec6330a18620,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:28.640020 env[1199]: time="2025-05-15T10:39:28.639987027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.3\" returns image reference \"sha256:bde24a3cb8851b59372b76b3ad78f8028d1a915ffed82c6cc6256f34e500bd3d\"" May 15 10:39:28.641057 env[1199]: time="2025-05-15T10:39:28.641035280Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\"" May 15 10:39:28.647686 env[1199]: time="2025-05-15T10:39:28.647630457Z" level=info msg="CreateContainer within sandbox \"4758a822224690d80026e042f0327ab5834a8bc651f2b5287eacddd285897669\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" May 15 10:39:28.690981 env[1199]: time="2025-05-15T10:39:28.690914745Z" level=info msg="CreateContainer within sandbox \"4758a822224690d80026e042f0327ab5834a8bc651f2b5287eacddd285897669\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"472a053b2ecf7c70bc7433d1957cb58993e4f0a6f1eafb2a7326d1dc91620063\"" May 15 10:39:28.691417 env[1199]: time="2025-05-15T10:39:28.691382375Z" level=info msg="StartContainer for \"472a053b2ecf7c70bc7433d1957cb58993e4f0a6f1eafb2a7326d1dc91620063\"" May 15 10:39:28.706383 systemd[1]: Started cri-containerd-472a053b2ecf7c70bc7433d1957cb58993e4f0a6f1eafb2a7326d1dc91620063.scope. May 15 10:39:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.720000 audit: BPF prog-id=129 op=LOAD May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=2399 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326130353362326563663763373062633734333364313935376362 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=2399 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326130353362326563663763373062633734333364313935376362 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit: BPF prog-id=130 op=LOAD May 15 10:39:28.721000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00024c300 items=0 ppid=2399 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326130353362326563663763373062633734333364313935376362 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit: BPF prog-id=131 op=LOAD May 15 10:39:28.721000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00024c348 items=0 ppid=2399 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326130353362326563663763373062633734333364313935376362 May 15 10:39:28.721000 audit: BPF prog-id=131 op=UNLOAD May 15 10:39:28.721000 audit: BPF prog-id=130 op=UNLOAD May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { perfmon } for pid=2543 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit[2543]: AVC avc: denied { bpf } for pid=2543 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:28.721000 audit: BPF prog-id=132 op=LOAD May 15 10:39:28.721000 audit[2543]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c00024c758 items=0 ppid=2399 pid=2543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:28.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437326130353362326563663763373062633734333364313935376362 May 15 10:39:28.747435 env[1199]: time="2025-05-15T10:39:28.747375006Z" level=info msg="StartContainer for \"472a053b2ecf7c70bc7433d1957cb58993e4f0a6f1eafb2a7326d1dc91620063\" returns successfully" May 15 10:39:29.232072 kubelet[1928]: E0515 10:39:29.231982 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:29.281425 kubelet[1928]: E0515 10:39:29.281390 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:30.282661 kubelet[1928]: I0515 10:39:30.282627 1928 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:39:30.283029 kubelet[1928]: E0515 10:39:30.282973 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:31.231654 kubelet[1928]: E0515 10:39:31.231604 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:33.231689 kubelet[1928]: E0515 10:39:33.231639 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:34.108660 kubelet[1928]: I0515 10:39:34.108624 1928 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:39:34.108934 kubelet[1928]: E0515 10:39:34.108912 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:34.118490 kubelet[1928]: I0515 10:39:34.118429 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-c95d55c78-mxcvp" podStartSLOduration=6.288391814 podStartE2EDuration="13.118414837s" podCreationTimestamp="2025-05-15 10:39:21 +0000 UTC" firstStartedPulling="2025-05-15 10:39:21.810795572 +0000 UTC m=+14.678481877" lastFinishedPulling="2025-05-15 10:39:28.640818575 +0000 UTC m=+21.508504900" observedRunningTime="2025-05-15 10:39:29.374312774 +0000 UTC m=+22.241999080" watchObservedRunningTime="2025-05-15 10:39:34.118414837 +0000 UTC m=+26.986101142" May 15 10:39:34.136000 audit[2576]: NETFILTER_CFG table=filter:95 family=2 entries=17 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.138586 kernel: kauditd_printk_skb: 91 callbacks suppressed May 15 10:39:34.138723 kernel: audit: type=1325 audit(1747305574.136:981): table=filter:95 family=2 entries=17 op=nft_register_rule pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.136000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd98ac7b60 a2=0 a3=7ffd98ac7b4c items=0 ppid=2074 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.147172 kernel: audit: type=1300 audit(1747305574.136:981): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd98ac7b60 a2=0 a3=7ffd98ac7b4c items=0 ppid=2074 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.147215 kernel: audit: type=1327 audit(1747305574.136:981): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.152000 audit[2576]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.152000 audit[2576]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd98ac7b60 a2=0 a3=7ffd98ac7b4c items=0 ppid=2074 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.161519 kernel: audit: type=1325 audit(1747305574.152:982): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.161583 kernel: audit: type=1300 audit(1747305574.152:982): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffd98ac7b60 a2=0 a3=7ffd98ac7b4c items=0 ppid=2074 pid=2576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.161608 kernel: audit: type=1327 audit(1747305574.152:982): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.170000 audit[2578]: NETFILTER_CFG table=filter:97 family=2 entries=17 op=nft_register_rule pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.170000 audit[2578]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd887cd9c0 a2=0 a3=7ffd887cd9ac items=0 ppid=2074 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.179187 kernel: audit: type=1325 audit(1747305574.170:983): table=filter:97 family=2 entries=17 op=nft_register_rule pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.179251 kernel: audit: type=1300 audit(1747305574.170:983): arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffd887cd9c0 a2=0 a3=7ffd887cd9ac items=0 ppid=2074 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.179282 kernel: audit: type=1327 audit(1747305574.170:983): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.182000 audit[2578]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_unregister_chain pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.182000 audit[2578]: SYSCALL arch=c000003e syscall=46 success=yes exit=2956 a0=3 a1=7ffd887cd9c0 a2=0 a3=0 items=0 ppid=2074 pid=2578 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:34.182000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:34.186827 kernel: audit: type=1325 audit(1747305574.182:984): table=nat:98 family=2 entries=19 op=nft_unregister_chain pid=2578 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:34.287891 kubelet[1928]: E0515 10:39:34.287861 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:35.191000 audit[2580]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=2580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:35.191000 audit[2580]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffe4e5847d0 a2=0 a3=7ffe4e5847bc items=0 ppid=2074 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:35.191000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:35.196000 audit[2580]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2580 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:35.196000 audit[2580]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffe4e5847d0 a2=0 a3=7ffe4e5847bc items=0 ppid=2074 pid=2580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:35.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:35.231601 kubelet[1928]: E0515 10:39:35.231548 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:37.231860 kubelet[1928]: E0515 10:39:37.231811 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:39.231821 kubelet[1928]: E0515 10:39:39.231740 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:40.844050 env[1199]: time="2025-05-15T10:39:40.844001358Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:40.846367 env[1199]: time="2025-05-15T10:39:40.846346886Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:40.850073 env[1199]: time="2025-05-15T10:39:40.850023996Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:40.851487 env[1199]: time="2025-05-15T10:39:40.851438424Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:4505ec8f976470994b6a94295a4dabac0cb98375db050e959a22603e00ada90b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:40.851936 env[1199]: time="2025-05-15T10:39:40.851902475Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.3\" returns image reference \"sha256:a140d04be1bc987bae0a1b9159e1dcb85751c448830efbdb3494207cf602b2d9\"" May 15 10:39:40.853671 env[1199]: time="2025-05-15T10:39:40.853636617Z" level=info msg="CreateContainer within sandbox \"c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" May 15 10:39:40.868913 env[1199]: time="2025-05-15T10:39:40.868869942Z" level=info msg="CreateContainer within sandbox \"c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"5da8092e673610f368b7bc0566f2f7728c6fc256cd724dfdd6fb392c2ba37a35\"" May 15 10:39:40.869439 env[1199]: time="2025-05-15T10:39:40.869401707Z" level=info msg="StartContainer for \"5da8092e673610f368b7bc0566f2f7728c6fc256cd724dfdd6fb392c2ba37a35\"" May 15 10:39:40.888004 systemd[1]: Started cri-containerd-5da8092e673610f368b7bc0566f2f7728c6fc256cd724dfdd6fb392c2ba37a35.scope. May 15 10:39:40.917000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.918899 kernel: kauditd_printk_skb: 8 callbacks suppressed May 15 10:39:40.918976 kernel: audit: type=1400 audit(1747305580.917:987): avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f078635a018 items=0 ppid=2379 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:40.927202 kernel: audit: type=1300 audit(1747305580.917:987): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f078635a018 items=0 ppid=2379 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:40.927272 kernel: audit: type=1327 audit(1747305580.917:987): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613830393265363733363130663336386237626330353636663266 May 15 10:39:40.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613830393265363733363130663336386237626330353636663266 May 15 10:39:40.931748 kernel: audit: type=1400 audit(1747305580.917:988): avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.941662 kernel: audit: type=1400 audit(1747305580.917:988): avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.941733 kernel: audit: type=1400 audit(1747305580.917:988): avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.944833 kernel: audit: type=1400 audit(1747305580.917:988): avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.947839 kernel: audit: type=1400 audit(1747305580.917:988): avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.963872 kernel: audit: type=1400 audit(1747305580.917:988): avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.964041 kernel: audit: type=1400 audit(1747305580.917:988): avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.917000 audit: BPF prog-id=133 op=LOAD May 15 10:39:40.917000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0001faad8 items=0 ppid=2379 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:40.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613830393265363733363130663336386237626330353636663266 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit: BPF prog-id=134 op=LOAD May 15 10:39:40.921000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0001fab28 items=0 ppid=2379 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:40.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613830393265363733363130663336386237626330353636663266 May 15 10:39:40.921000 audit: BPF prog-id=134 op=UNLOAD May 15 10:39:40.921000 audit: BPF prog-id=133 op=UNLOAD May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { perfmon } for pid=2589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit[2589]: AVC avc: denied { bpf } for pid=2589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:40.921000 audit: BPF prog-id=135 op=LOAD May 15 10:39:40.921000 audit[2589]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0001fabb8 items=0 ppid=2379 pid=2589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:40.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564613830393265363733363130663336386237626330353636663266 May 15 10:39:41.095764 env[1199]: time="2025-05-15T10:39:41.095633559Z" level=info msg="StartContainer for \"5da8092e673610f368b7bc0566f2f7728c6fc256cd724dfdd6fb392c2ba37a35\" returns successfully" May 15 10:39:41.231016 kubelet[1928]: E0515 10:39:41.230977 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:41.586500 kubelet[1928]: E0515 10:39:41.586463 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:42.588487 kubelet[1928]: E0515 10:39:42.588444 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:42.896528 env[1199]: time="2025-05-15T10:39:42.896389651Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" May 15 10:39:42.898260 systemd[1]: cri-containerd-5da8092e673610f368b7bc0566f2f7728c6fc256cd724dfdd6fb392c2ba37a35.scope: Deactivated successfully. May 15 10:39:42.903000 audit: BPF prog-id=135 op=UNLOAD May 15 10:39:42.915200 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5da8092e673610f368b7bc0566f2f7728c6fc256cd724dfdd6fb392c2ba37a35-rootfs.mount: Deactivated successfully. May 15 10:39:42.933868 kubelet[1928]: I0515 10:39:42.933837 1928 kubelet_node_status.go:488] "Fast updating node status as it just became ready" May 15 10:39:42.978355 env[1199]: time="2025-05-15T10:39:42.978301693Z" level=info msg="shim disconnected" id=5da8092e673610f368b7bc0566f2f7728c6fc256cd724dfdd6fb392c2ba37a35 May 15 10:39:42.978355 env[1199]: time="2025-05-15T10:39:42.978357594Z" level=warning msg="cleaning up after shim disconnected" id=5da8092e673610f368b7bc0566f2f7728c6fc256cd724dfdd6fb392c2ba37a35 namespace=k8s.io May 15 10:39:42.978560 env[1199]: time="2025-05-15T10:39:42.978369718Z" level=info msg="cleaning up dead shim" May 15 10:39:42.986306 env[1199]: time="2025-05-15T10:39:42.986227192Z" level=warning msg="cleanup warnings time=\"2025-05-15T10:39:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2632 runtime=io.containerd.runc.v2\n" May 15 10:39:43.000100 systemd[1]: Created slice kubepods-burstable-pod511be6b8_cb1d_49b9_97c8_78c9294ffecb.slice. May 15 10:39:43.006011 systemd[1]: Created slice kubepods-burstable-podd0203667_e96b_4313_a901_2551d21cc694.slice. May 15 10:39:43.014051 systemd[1]: Created slice kubepods-besteffort-pod8c0e0e6f_cec1_4204_bbc8_838b712558a7.slice. May 15 10:39:43.018908 systemd[1]: Created slice kubepods-besteffort-pod1142278d_8b06_4184_812a_ca4a647a625e.slice. May 15 10:39:43.022106 systemd[1]: Created slice kubepods-besteffort-podfe2d5227_eb07_415c_8504_c8ed4ba92582.slice. May 15 10:39:43.090453 kubelet[1928]: I0515 10:39:43.090401 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-45v6l\" (UniqueName: \"kubernetes.io/projected/511be6b8-cb1d-49b9-97c8-78c9294ffecb-kube-api-access-45v6l\") pod \"coredns-6f6b679f8f-h27s2\" (UID: \"511be6b8-cb1d-49b9-97c8-78c9294ffecb\") " pod="kube-system/coredns-6f6b679f8f-h27s2" May 15 10:39:43.090453 kubelet[1928]: I0515 10:39:43.090442 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8c0e0e6f-cec1-4204-bbc8-838b712558a7-tigera-ca-bundle\") pod \"calico-kube-controllers-79585c5f5c-9g8v9\" (UID: \"8c0e0e6f-cec1-4204-bbc8-838b712558a7\") " pod="calico-system/calico-kube-controllers-79585c5f5c-9g8v9" May 15 10:39:43.090453 kubelet[1928]: I0515 10:39:43.090460 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bjqd5\" (UniqueName: \"kubernetes.io/projected/fe2d5227-eb07-415c-8504-c8ed4ba92582-kube-api-access-bjqd5\") pod \"calico-apiserver-6d59ff67f4-xzd78\" (UID: \"fe2d5227-eb07-415c-8504-c8ed4ba92582\") " pod="calico-apiserver/calico-apiserver-6d59ff67f4-xzd78" May 15 10:39:43.090700 kubelet[1928]: I0515 10:39:43.090475 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/d0203667-e96b-4313-a901-2551d21cc694-config-volume\") pod \"coredns-6f6b679f8f-868hg\" (UID: \"d0203667-e96b-4313-a901-2551d21cc694\") " pod="kube-system/coredns-6f6b679f8f-868hg" May 15 10:39:43.090700 kubelet[1928]: I0515 10:39:43.090491 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dw764\" (UniqueName: \"kubernetes.io/projected/d0203667-e96b-4313-a901-2551d21cc694-kube-api-access-dw764\") pod \"coredns-6f6b679f8f-868hg\" (UID: \"d0203667-e96b-4313-a901-2551d21cc694\") " pod="kube-system/coredns-6f6b679f8f-868hg" May 15 10:39:43.090700 kubelet[1928]: I0515 10:39:43.090589 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8lhfz\" (UniqueName: \"kubernetes.io/projected/8c0e0e6f-cec1-4204-bbc8-838b712558a7-kube-api-access-8lhfz\") pod \"calico-kube-controllers-79585c5f5c-9g8v9\" (UID: \"8c0e0e6f-cec1-4204-bbc8-838b712558a7\") " pod="calico-system/calico-kube-controllers-79585c5f5c-9g8v9" May 15 10:39:43.090700 kubelet[1928]: I0515 10:39:43.090648 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/1142278d-8b06-4184-812a-ca4a647a625e-calico-apiserver-certs\") pod \"calico-apiserver-6d59ff67f4-rqv6w\" (UID: \"1142278d-8b06-4184-812a-ca4a647a625e\") " pod="calico-apiserver/calico-apiserver-6d59ff67f4-rqv6w" May 15 10:39:43.090700 kubelet[1928]: I0515 10:39:43.090674 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/511be6b8-cb1d-49b9-97c8-78c9294ffecb-config-volume\") pod \"coredns-6f6b679f8f-h27s2\" (UID: \"511be6b8-cb1d-49b9-97c8-78c9294ffecb\") " pod="kube-system/coredns-6f6b679f8f-h27s2" May 15 10:39:43.090854 kubelet[1928]: I0515 10:39:43.090692 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9htvt\" (UniqueName: \"kubernetes.io/projected/1142278d-8b06-4184-812a-ca4a647a625e-kube-api-access-9htvt\") pod \"calico-apiserver-6d59ff67f4-rqv6w\" (UID: \"1142278d-8b06-4184-812a-ca4a647a625e\") " pod="calico-apiserver/calico-apiserver-6d59ff67f4-rqv6w" May 15 10:39:43.090854 kubelet[1928]: I0515 10:39:43.090717 1928 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/fe2d5227-eb07-415c-8504-c8ed4ba92582-calico-apiserver-certs\") pod \"calico-apiserver-6d59ff67f4-xzd78\" (UID: \"fe2d5227-eb07-415c-8504-c8ed4ba92582\") " pod="calico-apiserver/calico-apiserver-6d59ff67f4-xzd78" May 15 10:39:43.235131 systemd[1]: Created slice kubepods-besteffort-pod7e870772_eaea_4b50_ab85_65106d357121.slice. May 15 10:39:43.241917 env[1199]: time="2025-05-15T10:39:43.241879968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9psfb,Uid:7e870772-eaea-4b50-ab85-65106d357121,Namespace:calico-system,Attempt:0,}" May 15 10:39:43.304622 kubelet[1928]: E0515 10:39:43.304577 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:43.305337 env[1199]: time="2025-05-15T10:39:43.305054519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-h27s2,Uid:511be6b8-cb1d-49b9-97c8-78c9294ffecb,Namespace:kube-system,Attempt:0,}" May 15 10:39:43.311365 kubelet[1928]: E0515 10:39:43.311339 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:43.311853 env[1199]: time="2025-05-15T10:39:43.311817937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-868hg,Uid:d0203667-e96b-4313-a901-2551d21cc694,Namespace:kube-system,Attempt:0,}" May 15 10:39:43.319470 env[1199]: time="2025-05-15T10:39:43.319429570Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79585c5f5c-9g8v9,Uid:8c0e0e6f-cec1-4204-bbc8-838b712558a7,Namespace:calico-system,Attempt:0,}" May 15 10:39:43.320846 env[1199]: time="2025-05-15T10:39:43.320791048Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d59ff67f4-rqv6w,Uid:1142278d-8b06-4184-812a-ca4a647a625e,Namespace:calico-apiserver,Attempt:0,}" May 15 10:39:43.324253 env[1199]: time="2025-05-15T10:39:43.324222766Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d59ff67f4-xzd78,Uid:fe2d5227-eb07-415c-8504-c8ed4ba92582,Namespace:calico-apiserver,Attempt:0,}" May 15 10:39:43.591543 kubelet[1928]: E0515 10:39:43.591517 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:43.593868 env[1199]: time="2025-05-15T10:39:43.593791218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\"" May 15 10:39:44.935404 env[1199]: time="2025-05-15T10:39:44.935248864Z" level=error msg="Failed to destroy network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:44.936309 env[1199]: time="2025-05-15T10:39:44.936276901Z" level=error msg="encountered an error cleaning up failed sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:44.936482 env[1199]: time="2025-05-15T10:39:44.936440363Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9psfb,Uid:7e870772-eaea-4b50-ab85-65106d357121,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:44.938229 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e-shm.mount: Deactivated successfully. May 15 10:39:44.939505 kubelet[1928]: E0515 10:39:44.939457 1928 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:44.939718 kubelet[1928]: E0515 10:39:44.939543 1928 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9psfb" May 15 10:39:44.939718 kubelet[1928]: E0515 10:39:44.939566 1928 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-9psfb" May 15 10:39:44.939718 kubelet[1928]: E0515 10:39:44.939610 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-9psfb_calico-system(7e870772-eaea-4b50-ab85-65106d357121)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-9psfb_calico-system(7e870772-eaea-4b50-ab85-65106d357121)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:45.010282 env[1199]: time="2025-05-15T10:39:45.010218115Z" level=error msg="Failed to destroy network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.010597 env[1199]: time="2025-05-15T10:39:45.010562784Z" level=error msg="encountered an error cleaning up failed sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.010648 env[1199]: time="2025-05-15T10:39:45.010615258Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-h27s2,Uid:511be6b8-cb1d-49b9-97c8-78c9294ffecb,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.011844 kubelet[1928]: E0515 10:39:45.010858 1928 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.011844 kubelet[1928]: E0515 10:39:45.010940 1928 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-h27s2" May 15 10:39:45.011844 kubelet[1928]: E0515 10:39:45.010976 1928 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-h27s2" May 15 10:39:45.012245 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32-shm.mount: Deactivated successfully. May 15 10:39:45.012559 kubelet[1928]: E0515 10:39:45.011020 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-h27s2_kube-system(511be6b8-cb1d-49b9-97c8-78c9294ffecb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-h27s2_kube-system(511be6b8-cb1d-49b9-97c8-78c9294ffecb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-h27s2" podUID="511be6b8-cb1d-49b9-97c8-78c9294ffecb" May 15 10:39:45.022313 env[1199]: time="2025-05-15T10:39:45.022242092Z" level=error msg="Failed to destroy network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.024251 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0-shm.mount: Deactivated successfully. May 15 10:39:45.025514 env[1199]: time="2025-05-15T10:39:45.025474618Z" level=error msg="encountered an error cleaning up failed sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.025569 env[1199]: time="2025-05-15T10:39:45.025526981Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d59ff67f4-rqv6w,Uid:1142278d-8b06-4184-812a-ca4a647a625e,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.025946 kubelet[1928]: E0515 10:39:45.025766 1928 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.025946 kubelet[1928]: E0515 10:39:45.025838 1928 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d59ff67f4-rqv6w" May 15 10:39:45.025946 kubelet[1928]: E0515 10:39:45.025855 1928 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d59ff67f4-rqv6w" May 15 10:39:45.026075 kubelet[1928]: E0515 10:39:45.025902 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6d59ff67f4-rqv6w_calico-apiserver(1142278d-8b06-4184-812a-ca4a647a625e)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6d59ff67f4-rqv6w_calico-apiserver(1142278d-8b06-4184-812a-ca4a647a625e)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d59ff67f4-rqv6w" podUID="1142278d-8b06-4184-812a-ca4a647a625e" May 15 10:39:45.027569 env[1199]: time="2025-05-15T10:39:45.027531277Z" level=error msg="Failed to destroy network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.027966 env[1199]: time="2025-05-15T10:39:45.027940394Z" level=error msg="encountered an error cleaning up failed sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.028082 env[1199]: time="2025-05-15T10:39:45.028053947Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79585c5f5c-9g8v9,Uid:8c0e0e6f-cec1-4204-bbc8-838b712558a7,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.028405 kubelet[1928]: E0515 10:39:45.028295 1928 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.028405 kubelet[1928]: E0515 10:39:45.028326 1928 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79585c5f5c-9g8v9" May 15 10:39:45.028405 kubelet[1928]: E0515 10:39:45.028339 1928 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79585c5f5c-9g8v9" May 15 10:39:45.028503 kubelet[1928]: E0515 10:39:45.028363 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-79585c5f5c-9g8v9_calico-system(8c0e0e6f-cec1-4204-bbc8-838b712558a7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-79585c5f5c-9g8v9_calico-system(8c0e0e6f-cec1-4204-bbc8-838b712558a7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79585c5f5c-9g8v9" podUID="8c0e0e6f-cec1-4204-bbc8-838b712558a7" May 15 10:39:45.035433 env[1199]: time="2025-05-15T10:39:45.035397648Z" level=error msg="Failed to destroy network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.035816 env[1199]: time="2025-05-15T10:39:45.035774871Z" level=error msg="encountered an error cleaning up failed sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.035935 env[1199]: time="2025-05-15T10:39:45.035907461Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-868hg,Uid:d0203667-e96b-4313-a901-2551d21cc694,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.036238 kubelet[1928]: E0515 10:39:45.036121 1928 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.036238 kubelet[1928]: E0515 10:39:45.036156 1928 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-868hg" May 15 10:39:45.036238 kubelet[1928]: E0515 10:39:45.036171 1928 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-868hg" May 15 10:39:45.036342 kubelet[1928]: E0515 10:39:45.036204 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-868hg_kube-system(d0203667-e96b-4313-a901-2551d21cc694)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-868hg_kube-system(d0203667-e96b-4313-a901-2551d21cc694)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-868hg" podUID="d0203667-e96b-4313-a901-2551d21cc694" May 15 10:39:45.044694 env[1199]: time="2025-05-15T10:39:45.044627844Z" level=error msg="Failed to destroy network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.045042 env[1199]: time="2025-05-15T10:39:45.045006870Z" level=error msg="encountered an error cleaning up failed sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.045084 env[1199]: time="2025-05-15T10:39:45.045057369Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d59ff67f4-xzd78,Uid:fe2d5227-eb07-415c-8504-c8ed4ba92582,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.045265 kubelet[1928]: E0515 10:39:45.045212 1928 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.045265 kubelet[1928]: E0515 10:39:45.045244 1928 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d59ff67f4-xzd78" May 15 10:39:45.045265 kubelet[1928]: E0515 10:39:45.045258 1928 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-6d59ff67f4-xzd78" May 15 10:39:45.045476 kubelet[1928]: E0515 10:39:45.045288 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-6d59ff67f4-xzd78_calico-apiserver(fe2d5227-eb07-415c-8504-c8ed4ba92582)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-6d59ff67f4-xzd78_calico-apiserver(fe2d5227-eb07-415c-8504-c8ed4ba92582)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d59ff67f4-xzd78" podUID="fe2d5227-eb07-415c-8504-c8ed4ba92582" May 15 10:39:45.596272 kubelet[1928]: I0515 10:39:45.596221 1928 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:39:45.598259 kubelet[1928]: I0515 10:39:45.598212 1928 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:39:45.599859 kubelet[1928]: I0515 10:39:45.599834 1928 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:39:45.601129 env[1199]: time="2025-05-15T10:39:45.601092098Z" level=info msg="StopPodSandbox for \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\"" May 15 10:39:45.601217 kubelet[1928]: I0515 10:39:45.601134 1928 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:39:45.601486 env[1199]: time="2025-05-15T10:39:45.601446536Z" level=info msg="StopPodSandbox for \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\"" May 15 10:39:45.601831 env[1199]: time="2025-05-15T10:39:45.601761044Z" level=info msg="StopPodSandbox for \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\"" May 15 10:39:45.601887 env[1199]: time="2025-05-15T10:39:45.601850211Z" level=info msg="StopPodSandbox for \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\"" May 15 10:39:45.603274 kubelet[1928]: I0515 10:39:45.603238 1928 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:39:45.603853 env[1199]: time="2025-05-15T10:39:45.603783247Z" level=info msg="StopPodSandbox for \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\"" May 15 10:39:45.606879 kubelet[1928]: I0515 10:39:45.606576 1928 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:39:45.608073 env[1199]: time="2025-05-15T10:39:45.608026182Z" level=info msg="StopPodSandbox for \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\"" May 15 10:39:45.638212 env[1199]: time="2025-05-15T10:39:45.638156083Z" level=error msg="StopPodSandbox for \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\" failed" error="failed to destroy network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.638623 kubelet[1928]: E0515 10:39:45.638576 1928 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:39:45.638700 kubelet[1928]: E0515 10:39:45.638637 1928 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0"} May 15 10:39:45.638700 kubelet[1928]: E0515 10:39:45.638691 1928 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1142278d-8b06-4184-812a-ca4a647a625e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:45.638886 kubelet[1928]: E0515 10:39:45.638712 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1142278d-8b06-4184-812a-ca4a647a625e\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d59ff67f4-rqv6w" podUID="1142278d-8b06-4184-812a-ca4a647a625e" May 15 10:39:45.653444 env[1199]: time="2025-05-15T10:39:45.653381654Z" level=error msg="StopPodSandbox for \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\" failed" error="failed to destroy network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.654667 kubelet[1928]: E0515 10:39:45.654627 1928 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:39:45.654667 kubelet[1928]: E0515 10:39:45.654669 1928 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e"} May 15 10:39:45.655683 kubelet[1928]: E0515 10:39:45.655650 1928 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"7e870772-eaea-4b50-ab85-65106d357121\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:45.656630 kubelet[1928]: E0515 10:39:45.656602 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"7e870772-eaea-4b50-ab85-65106d357121\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-9psfb" podUID="7e870772-eaea-4b50-ab85-65106d357121" May 15 10:39:45.664845 env[1199]: time="2025-05-15T10:39:45.664786502Z" level=error msg="StopPodSandbox for \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\" failed" error="failed to destroy network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.665263 kubelet[1928]: E0515 10:39:45.665230 1928 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:39:45.665336 kubelet[1928]: E0515 10:39:45.665266 1928 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c"} May 15 10:39:45.665336 kubelet[1928]: E0515 10:39:45.665287 1928 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8c0e0e6f-cec1-4204-bbc8-838b712558a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:45.665336 kubelet[1928]: E0515 10:39:45.665305 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8c0e0e6f-cec1-4204-bbc8-838b712558a7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79585c5f5c-9g8v9" podUID="8c0e0e6f-cec1-4204-bbc8-838b712558a7" May 15 10:39:45.665842 env[1199]: time="2025-05-15T10:39:45.665782393Z" level=error msg="StopPodSandbox for \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\" failed" error="failed to destroy network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.666077 kubelet[1928]: E0515 10:39:45.666031 1928 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:39:45.666125 kubelet[1928]: E0515 10:39:45.666088 1928 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9"} May 15 10:39:45.666158 kubelet[1928]: E0515 10:39:45.666124 1928 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fe2d5227-eb07-415c-8504-c8ed4ba92582\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:45.666248 kubelet[1928]: E0515 10:39:45.666148 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fe2d5227-eb07-415c-8504-c8ed4ba92582\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-6d59ff67f4-xzd78" podUID="fe2d5227-eb07-415c-8504-c8ed4ba92582" May 15 10:39:45.669276 env[1199]: time="2025-05-15T10:39:45.669234060Z" level=error msg="StopPodSandbox for \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\" failed" error="failed to destroy network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.669483 kubelet[1928]: E0515 10:39:45.669441 1928 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:39:45.669538 kubelet[1928]: E0515 10:39:45.669496 1928 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32"} May 15 10:39:45.669538 kubelet[1928]: E0515 10:39:45.669529 1928 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"511be6b8-cb1d-49b9-97c8-78c9294ffecb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:45.669619 kubelet[1928]: E0515 10:39:45.669559 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"511be6b8-cb1d-49b9-97c8-78c9294ffecb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-h27s2" podUID="511be6b8-cb1d-49b9-97c8-78c9294ffecb" May 15 10:39:45.672882 env[1199]: time="2025-05-15T10:39:45.672822366Z" level=error msg="StopPodSandbox for \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\" failed" error="failed to destroy network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" May 15 10:39:45.673039 kubelet[1928]: E0515 10:39:45.673017 1928 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:39:45.673098 kubelet[1928]: E0515 10:39:45.673054 1928 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1"} May 15 10:39:45.673098 kubelet[1928]: E0515 10:39:45.673080 1928 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d0203667-e96b-4313-a901-2551d21cc694\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" May 15 10:39:45.673187 kubelet[1928]: E0515 10:39:45.673100 1928 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d0203667-e96b-4313-a901-2551d21cc694\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-868hg" podUID="d0203667-e96b-4313-a901-2551d21cc694" May 15 10:39:45.917320 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9-shm.mount: Deactivated successfully. May 15 10:39:45.917443 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c-shm.mount: Deactivated successfully. May 15 10:39:45.917507 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1-shm.mount: Deactivated successfully. May 15 10:39:46.622767 systemd[1]: Started sshd@7-10.0.0.55:22-10.0.0.1:49542.service. May 15 10:39:46.622000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.55:22-10.0.0.1:49542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:46.628590 kernel: kauditd_printk_skb: 34 callbacks suppressed May 15 10:39:46.628712 kernel: audit: type=1130 audit(1747305586.622:994): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.55:22-10.0.0.1:49542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:46.667000 audit[3032]: USER_ACCT pid=3032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.671023 sshd[3032]: Accepted publickey for core from 10.0.0.1 port 49542 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:46.674856 kernel: audit: type=1101 audit(1747305586.667:995): pid=3032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.674936 kernel: audit: type=1103 audit(1747305586.671:996): pid=3032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.671000 audit[3032]: CRED_ACQ pid=3032 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.673832 sshd[3032]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:46.683835 kernel: audit: type=1006 audit(1747305586.671:997): pid=3032 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 May 15 10:39:46.683878 kernel: audit: type=1300 audit(1747305586.671:997): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0edff860 a2=3 a3=0 items=0 ppid=1 pid=3032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.671000 audit[3032]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0edff860 a2=3 a3=0 items=0 ppid=1 pid=3032 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:46.678561 systemd-logind[1187]: New session 8 of user core. May 15 10:39:46.679220 systemd[1]: Started session-8.scope. May 15 10:39:46.684564 kernel: audit: type=1327 audit(1747305586.671:997): proctitle=737368643A20636F7265205B707269765D May 15 10:39:46.671000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:46.682000 audit[3032]: USER_START pid=3032 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.691097 kernel: audit: type=1105 audit(1747305586.682:998): pid=3032 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.691136 kernel: audit: type=1103 audit(1747305586.683:999): pid=3034 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.683000 audit[3034]: CRED_ACQ pid=3034 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.799567 sshd[3032]: pam_unix(sshd:session): session closed for user core May 15 10:39:46.799000 audit[3032]: USER_END pid=3032 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.801794 systemd[1]: sshd@7-10.0.0.55:22-10.0.0.1:49542.service: Deactivated successfully. May 15 10:39:46.802542 systemd[1]: session-8.scope: Deactivated successfully. May 15 10:39:46.803206 systemd-logind[1187]: Session 8 logged out. Waiting for processes to exit. May 15 10:39:46.803956 systemd-logind[1187]: Removed session 8. May 15 10:39:46.805845 kernel: audit: type=1106 audit(1747305586.799:1000): pid=3032 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.799000 audit[3032]: CRED_DISP pid=3032 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:46.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.55:22-10.0.0.1:49542 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:46.810832 kernel: audit: type=1104 audit(1747305586.799:1001): pid=3032 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.810017 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:39:51.810200 kernel: audit: type=1130 audit(1747305591.803:1003): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.55:22-10.0.0.1:49556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:51.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.55:22-10.0.0.1:49556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:51.803997 systemd[1]: Started sshd@8-10.0.0.55:22-10.0.0.1:49556.service. May 15 10:39:51.837000 audit[3052]: USER_ACCT pid=3052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.842642 sshd[3052]: Accepted publickey for core from 10.0.0.1 port 49556 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:51.842830 kernel: audit: type=1101 audit(1747305591.837:1004): pid=3052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.841000 audit[3052]: CRED_ACQ pid=3052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.846857 systemd-logind[1187]: New session 9 of user core. May 15 10:39:51.843038 sshd[3052]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:51.847107 systemd[1]: Started session-9.scope. May 15 10:39:51.854230 kernel: audit: type=1103 audit(1747305591.841:1005): pid=3052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.854273 kernel: audit: type=1006 audit(1747305591.841:1006): pid=3052 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 May 15 10:39:51.854293 kernel: audit: type=1300 audit(1747305591.841:1006): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc0184fe0 a2=3 a3=0 items=0 ppid=1 pid=3052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.841000 audit[3052]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc0184fe0 a2=3 a3=0 items=0 ppid=1 pid=3052 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:51.841000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:51.856001 kernel: audit: type=1327 audit(1747305591.841:1006): proctitle=737368643A20636F7265205B707269765D May 15 10:39:51.851000 audit[3052]: USER_START pid=3052 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.860765 kernel: audit: type=1105 audit(1747305591.851:1007): pid=3052 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.852000 audit[3054]: CRED_ACQ pid=3054 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.864833 kernel: audit: type=1103 audit(1747305591.852:1008): pid=3054 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.975506 sshd[3052]: pam_unix(sshd:session): session closed for user core May 15 10:39:51.975000 audit[3052]: USER_END pid=3052 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.978042 systemd[1]: sshd@8-10.0.0.55:22-10.0.0.1:49556.service: Deactivated successfully. May 15 10:39:51.978762 systemd[1]: session-9.scope: Deactivated successfully. May 15 10:39:51.986177 kernel: audit: type=1106 audit(1747305591.975:1009): pid=3052 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.986293 kernel: audit: type=1104 audit(1747305591.975:1010): pid=3052 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.975000 audit[3052]: CRED_DISP pid=3052 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:51.986428 systemd-logind[1187]: Session 9 logged out. Waiting for processes to exit. May 15 10:39:51.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.55:22-10.0.0.1:49556 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:51.987283 systemd-logind[1187]: Removed session 9. May 15 10:39:52.725751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3187765029.mount: Deactivated successfully. May 15 10:39:54.170440 env[1199]: time="2025-05-15T10:39:54.170396474Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:54.172898 env[1199]: time="2025-05-15T10:39:54.172851331Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:54.175226 env[1199]: time="2025-05-15T10:39:54.175183470Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:54.177050 env[1199]: time="2025-05-15T10:39:54.177015683Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:750e267b4f8217e0ca9e4107228370190d1a2499b72112ad04370ab9b4553916,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:39:54.177294 env[1199]: time="2025-05-15T10:39:54.177267405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.3\" returns image reference \"sha256:042163432abcec06b8077b24973b223a5f4cfdb35d85c3816f5d07a13d51afae\"" May 15 10:39:54.188776 env[1199]: time="2025-05-15T10:39:54.188725242Z" level=info msg="CreateContainer within sandbox \"c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" May 15 10:39:54.210622 env[1199]: time="2025-05-15T10:39:54.210578204Z" level=info msg="CreateContainer within sandbox \"c05bf9dde88ee2205d85f13dd1f379861532b89aa3c52f52c26c0dc4d030efaa\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"f1f25212b50bd8d67e01e5580e62bb36424448eedd3051d0e6ba532f0e05335f\"" May 15 10:39:54.211271 env[1199]: time="2025-05-15T10:39:54.211244634Z" level=info msg="StartContainer for \"f1f25212b50bd8d67e01e5580e62bb36424448eedd3051d0e6ba532f0e05335f\"" May 15 10:39:54.226113 systemd[1]: Started cri-containerd-f1f25212b50bd8d67e01e5580e62bb36424448eedd3051d0e6ba532f0e05335f.scope. May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa82ad9de18 items=0 ppid=2379 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:54.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631663235323132623530626438643637653031653535383065363262 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit: BPF prog-id=136 op=LOAD May 15 10:39:54.242000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000098298 items=0 ppid=2379 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:54.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631663235323132623530626438643637653031653535383065363262 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit: BPF prog-id=137 op=LOAD May 15 10:39:54.242000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000982e8 items=0 ppid=2379 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:54.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631663235323132623530626438643637653031653535383065363262 May 15 10:39:54.242000 audit: BPF prog-id=137 op=UNLOAD May 15 10:39:54.242000 audit: BPF prog-id=136 op=UNLOAD May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { perfmon } for pid=3075 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit[3075]: AVC avc: denied { bpf } for pid=3075 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:54.242000 audit: BPF prog-id=138 op=LOAD May 15 10:39:54.242000 audit[3075]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000098378 items=0 ppid=2379 pid=3075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:54.242000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631663235323132623530626438643637653031653535383065363262 May 15 10:39:54.333877 env[1199]: time="2025-05-15T10:39:54.333831930Z" level=info msg="StartContainer for \"f1f25212b50bd8d67e01e5580e62bb36424448eedd3051d0e6ba532f0e05335f\" returns successfully" May 15 10:39:54.367346 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. May 15 10:39:54.367470 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. May 15 10:39:54.635510 kubelet[1928]: E0515 10:39:54.635460 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:54.653936 kubelet[1928]: I0515 10:39:54.653559 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-pxtr4" podStartSLOduration=1.2558060260000001 podStartE2EDuration="33.653540705s" podCreationTimestamp="2025-05-15 10:39:21 +0000 UTC" firstStartedPulling="2025-05-15 10:39:21.780286666 +0000 UTC m=+14.647972971" lastFinishedPulling="2025-05-15 10:39:54.178021345 +0000 UTC m=+47.045707650" observedRunningTime="2025-05-15 10:39:54.650797535 +0000 UTC m=+47.518483870" watchObservedRunningTime="2025-05-15 10:39:54.653540705 +0000 UTC m=+47.521227030" May 15 10:39:55.595000 audit[3226]: AVC avc: denied { write } for pid=3226 comm="tee" name="fd" dev="proc" ino=22463 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:55.595000 audit[3231]: AVC avc: denied { write } for pid=3231 comm="tee" name="fd" dev="proc" ino=25675 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:55.595000 audit[3231]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdaf047a2a a2=241 a3=1b6 items=1 ppid=3164 pid=3231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.595000 audit: CWD cwd="/etc/service/enabled/bird6/log" May 15 10:39:55.595000 audit: PATH item=0 name="/dev/fd/63" inode=25001 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:55.595000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:55.595000 audit[3226]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc96ca7a1b a2=241 a3=1b6 items=1 ppid=3180 pid=3226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.595000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" May 15 10:39:55.595000 audit: PATH item=0 name="/dev/fd/63" inode=25669 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:55.595000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:55.601000 audit[3237]: AVC avc: denied { write } for pid=3237 comm="tee" name="fd" dev="proc" ino=25007 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:55.601000 audit[3237]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcc9841a2a a2=241 a3=1b6 items=1 ppid=3178 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.601000 audit: CWD cwd="/etc/service/enabled/confd/log" May 15 10:39:55.601000 audit: PATH item=0 name="/dev/fd/63" inode=25672 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:55.601000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:55.602000 audit[3245]: AVC avc: denied { write } for pid=3245 comm="tee" name="fd" dev="proc" ino=24200 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:55.602000 audit[3245]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9c695a2b a2=241 a3=1b6 items=1 ppid=3165 pid=3245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.602000 audit: CWD cwd="/etc/service/enabled/bird/log" May 15 10:39:55.602000 audit: PATH item=0 name="/dev/fd/63" inode=25004 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:55.602000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:55.603000 audit[3243]: AVC avc: denied { write } for pid=3243 comm="tee" name="fd" dev="proc" ino=24204 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:55.603000 audit[3243]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffeaf396a2a a2=241 a3=1b6 items=1 ppid=3171 pid=3243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.603000 audit: CWD cwd="/etc/service/enabled/felix/log" May 15 10:39:55.603000 audit: PATH item=0 name="/dev/fd/63" inode=22466 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:55.603000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:55.607000 audit[3221]: AVC avc: denied { write } for pid=3221 comm="tee" name="fd" dev="proc" ino=22470 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:55.607000 audit[3221]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd03d5ca2c a2=241 a3=1b6 items=1 ppid=3173 pid=3221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.607000 audit: CWD cwd="/etc/service/enabled/cni/log" May 15 10:39:55.607000 audit: PATH item=0 name="/dev/fd/63" inode=25664 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:55.610000 audit[3240]: AVC avc: denied { write } for pid=3240 comm="tee" name="fd" dev="proc" ino=25017 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 May 15 10:39:55.610000 audit[3240]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffd34d6a1a a2=241 a3=1b6 items=1 ppid=3167 pid=3240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.610000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" May 15 10:39:55.610000 audit: PATH item=0 name="/dev/fd/63" inode=24197 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 May 15 10:39:55.610000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:55.607000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 May 15 10:39:55.637165 kubelet[1928]: E0515 10:39:55.637126 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:55.654489 systemd[1]: run-containerd-runc-k8s.io-f1f25212b50bd8d67e01e5580e62bb36424448eedd3051d0e6ba532f0e05335f-runc.knXGdz.mount: Deactivated successfully. May 15 10:39:55.695000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.695000 audit: BPF prog-id=139 op=LOAD May 15 10:39:55.695000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fff10482bd0 a2=98 a3=3 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.695000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.696000 audit: BPF prog-id=139 op=UNLOAD May 15 10:39:55.696000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit: BPF prog-id=140 op=LOAD May 15 10:39:55.696000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff104829b0 a2=74 a3=540051 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.696000 audit: BPF prog-id=140 op=UNLOAD May 15 10:39:55.696000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.696000 audit: BPF prog-id=141 op=LOAD May 15 10:39:55.696000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff104829e0 a2=94 a3=2 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.696000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.696000 audit: BPF prog-id=141 op=UNLOAD May 15 10:39:55.800000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit: BPF prog-id=142 op=LOAD May 15 10:39:55.800000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff104828a0 a2=40 a3=1 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.800000 audit: BPF prog-id=142 op=UNLOAD May 15 10:39:55.800000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.800000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff10482970 a2=50 a3=7fff10482a50 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.800000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.807000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.807000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff104828b0 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.807000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.807000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff104828e0 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.807000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.807000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff104827f0 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.807000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff10482900 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff104828e0 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff104828d0 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff10482900 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff104828e0 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff10482900 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fff104828d0 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff10482940 a2=28 a3=0 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff104826f0 a2=50 a3=1 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit: BPF prog-id=143 op=LOAD May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fff104826f0 a2=94 a3=5 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit: BPF prog-id=143 op=UNLOAD May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7fff104827a0 a2=50 a3=1 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7fff104828c0 a2=4 a3=38 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { confidentiality } for pid=3301 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff10482910 a2=94 a3=6 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { confidentiality } for pid=3301 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff104820c0 a2=94 a3=83 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { perfmon } for pid=3301 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { bpf } for pid=3301 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.808000 audit[3301]: AVC avc: denied { confidentiality } for pid=3301 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:55.808000 audit[3301]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7fff104820c0 a2=94 a3=83 items=0 ppid=3172 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.808000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit: BPF prog-id=144 op=LOAD May 15 10:39:55.814000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8d9aa520 a2=98 a3=1999999999999999 items=0 ppid=3172 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.814000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:55.814000 audit: BPF prog-id=144 op=UNLOAD May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit: BPF prog-id=145 op=LOAD May 15 10:39:55.814000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8d9aa400 a2=74 a3=ffff items=0 ppid=3172 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.814000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:55.814000 audit: BPF prog-id=145 op=UNLOAD May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { perfmon } for pid=3307 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit[3307]: AVC avc: denied { bpf } for pid=3307 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.814000 audit: BPF prog-id=146 op=LOAD May 15 10:39:55.814000 audit[3307]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffd8d9aa440 a2=40 a3=7ffd8d9aa620 items=0 ppid=3172 pid=3307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.814000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F May 15 10:39:55.815000 audit: BPF prog-id=146 op=UNLOAD May 15 10:39:55.850864 systemd-networkd[1025]: vxlan.calico: Link UP May 15 10:39:55.850873 systemd-networkd[1025]: vxlan.calico: Gained carrier May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit: BPF prog-id=147 op=LOAD May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe99645710 a2=98 a3=ffffffff items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit: BPF prog-id=147 op=UNLOAD May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit: BPF prog-id=148 op=LOAD May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe99645520 a2=74 a3=540051 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit: BPF prog-id=148 op=UNLOAD May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit: BPF prog-id=149 op=LOAD May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe99645550 a2=94 a3=2 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit: BPF prog-id=149 op=UNLOAD May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe99645420 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99645450 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99645360 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe99645470 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe99645450 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe99645440 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe99645470 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99645450 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99645470 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe99645440 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffe996454b0 a2=28 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.870000 audit: BPF prog-id=150 op=LOAD May 15 10:39:55.870000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe99645320 a2=40 a3=0 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.870000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.871000 audit: BPF prog-id=150 op=UNLOAD May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffe99645310 a2=50 a3=2800 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffe99645310 a2=50 a3=2800 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit: BPF prog-id=151 op=LOAD May 15 10:39:55.871000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe99644b30 a2=94 a3=2 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.871000 audit: BPF prog-id=151 op=UNLOAD May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { perfmon } for pid=3334 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit[3334]: AVC avc: denied { bpf } for pid=3334 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.871000 audit: BPF prog-id=152 op=LOAD May 15 10:39:55.871000 audit[3334]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe99644c30 a2=94 a3=30 items=0 ppid=3172 pid=3334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.871000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit: BPF prog-id=153 op=LOAD May 15 10:39:55.873000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc9c7da610 a2=98 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.873000 audit: BPF prog-id=153 op=UNLOAD May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit: BPF prog-id=154 op=LOAD May 15 10:39:55.873000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9c7da3f0 a2=74 a3=540051 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.873000 audit: BPF prog-id=154 op=UNLOAD May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.873000 audit: BPF prog-id=155 op=LOAD May 15 10:39:55.873000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9c7da420 a2=94 a3=2 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.873000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.874000 audit: BPF prog-id=155 op=UNLOAD May 15 10:39:55.979000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit: BPF prog-id=156 op=LOAD May 15 10:39:55.979000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc9c7da2e0 a2=40 a3=1 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.979000 audit: BPF prog-id=156 op=UNLOAD May 15 10:39:55.979000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.979000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc9c7da3b0 a2=50 a3=7ffc9c7da490 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.979000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c7da2f0 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c7da320 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c7da230 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c7da340 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c7da320 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c7da310 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c7da340 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c7da320 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c7da340 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc9c7da310 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc9c7da380 a2=28 a3=0 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.986000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.986000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9c7da130 a2=50 a3=1 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.986000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit: BPF prog-id=157 op=LOAD May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc9c7da130 a2=94 a3=5 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit: BPF prog-id=157 op=UNLOAD May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc9c7da1e0 a2=50 a3=1 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc9c7da300 a2=4 a3=38 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { confidentiality } for pid=3338 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9c7da350 a2=94 a3=6 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { confidentiality } for pid=3338 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9c7d9b00 a2=94 a3=83 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { perfmon } for pid=3338 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { confidentiality } for pid=3338 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc9c7d9b00 a2=94 a3=83 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c7db540 a2=10 a3=208 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c7db3e0 a2=10 a3=3 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c7db380 a2=10 a3=3 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.987000 audit[3338]: AVC avc: denied { bpf } for pid=3338 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:55.987000 audit[3338]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffc9c7db380 a2=10 a3=7 items=0 ppid=3172 pid=3338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:55.987000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 May 15 10:39:55.994000 audit: BPF prog-id=152 op=UNLOAD May 15 10:39:56.055000 audit[3368]: NETFILTER_CFG table=mangle:101 family=2 entries=16 op=nft_register_chain pid=3368 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:56.055000 audit[3368]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc5fcb84e0 a2=0 a3=7ffc5fcb84cc items=0 ppid=3172 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.055000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:56.062000 audit[3367]: NETFILTER_CFG table=nat:102 family=2 entries=15 op=nft_register_chain pid=3367 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:56.062000 audit[3367]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd7a1588f0 a2=0 a3=7ffd7a1588dc items=0 ppid=3172 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.062000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:56.062000 audit[3369]: NETFILTER_CFG table=filter:103 family=2 entries=39 op=nft_register_chain pid=3369 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:56.062000 audit[3369]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe743a2300 a2=0 a3=55624d4b7000 items=0 ppid=3172 pid=3369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.062000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:56.064000 audit[3366]: NETFILTER_CFG table=raw:104 family=2 entries=21 op=nft_register_chain pid=3366 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:56.064000 audit[3366]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc2c456b00 a2=0 a3=7ffc2c456aec items=0 ppid=3172 pid=3366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.064000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:56.232002 env[1199]: time="2025-05-15T10:39:56.231873977Z" level=info msg="StopPodSandbox for \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\"" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.300 [INFO][3395] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.300 [INFO][3395] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" iface="eth0" netns="/var/run/netns/cni-b516fc1f-da45-a24c-d2bd-be0ae9a2afd2" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.300 [INFO][3395] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" iface="eth0" netns="/var/run/netns/cni-b516fc1f-da45-a24c-d2bd-be0ae9a2afd2" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.301 [INFO][3395] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" iface="eth0" netns="/var/run/netns/cni-b516fc1f-da45-a24c-d2bd-be0ae9a2afd2" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.301 [INFO][3395] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.301 [INFO][3395] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.350 [INFO][3403] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.350 [INFO][3403] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.350 [INFO][3403] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.357 [WARNING][3403] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.357 [INFO][3403] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.359 [INFO][3403] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:56.362333 env[1199]: 2025-05-15 10:39:56.360 [INFO][3395] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:39:56.363002 env[1199]: time="2025-05-15T10:39:56.362967405Z" level=info msg="TearDown network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\" successfully" May 15 10:39:56.363080 env[1199]: time="2025-05-15T10:39:56.363058423Z" level=info msg="StopPodSandbox for \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\" returns successfully" May 15 10:39:56.363967 env[1199]: time="2025-05-15T10:39:56.363929830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79585c5f5c-9g8v9,Uid:8c0e0e6f-cec1-4204-bbc8-838b712558a7,Namespace:calico-system,Attempt:1,}" May 15 10:39:56.365100 systemd[1]: run-netns-cni\x2db516fc1f\x2dda45\x2da24c\x2dd2bd\x2dbe0ae9a2afd2.mount: Deactivated successfully. May 15 10:39:56.666965 systemd-networkd[1025]: cali1fd5c9d0d82: Link UP May 15 10:39:56.669186 systemd-networkd[1025]: cali1fd5c9d0d82: Gained carrier May 15 10:39:56.669836 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1fd5c9d0d82: link becomes ready May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.611 [INFO][3413] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0 calico-kube-controllers-79585c5f5c- calico-system 8c0e0e6f-cec1-4204-bbc8-838b712558a7 866 0 2025-05-15 10:39:21 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:79585c5f5c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-79585c5f5c-9g8v9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali1fd5c9d0d82 [] []}} ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Namespace="calico-system" Pod="calico-kube-controllers-79585c5f5c-9g8v9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.611 [INFO][3413] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Namespace="calico-system" Pod="calico-kube-controllers-79585c5f5c-9g8v9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.636 [INFO][3427] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" HandleID="k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.643 [INFO][3427] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" HandleID="k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002dd4d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-79585c5f5c-9g8v9", "timestamp":"2025-05-15 10:39:56.636074219 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.643 [INFO][3427] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.643 [INFO][3427] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.643 [INFO][3427] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.644 [INFO][3427] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.648 [INFO][3427] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.651 [INFO][3427] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.652 [INFO][3427] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.653 [INFO][3427] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.654 [INFO][3427] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.655 [INFO][3427] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332 May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.658 [INFO][3427] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.662 [INFO][3427] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.662 [INFO][3427] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" host="localhost" May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.662 [INFO][3427] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:56.678885 env[1199]: 2025-05-15 10:39:56.662 [INFO][3427] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" HandleID="k8s-pod-network.542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.679698 env[1199]: 2025-05-15 10:39:56.665 [INFO][3413] cni-plugin/k8s.go 386: Populated endpoint ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Namespace="calico-system" Pod="calico-kube-controllers-79585c5f5c-9g8v9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0", GenerateName:"calico-kube-controllers-79585c5f5c-", Namespace:"calico-system", SelfLink:"", UID:"8c0e0e6f-cec1-4204-bbc8-838b712558a7", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79585c5f5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-79585c5f5c-9g8v9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1fd5c9d0d82", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:56.679698 env[1199]: 2025-05-15 10:39:56.665 [INFO][3413] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Namespace="calico-system" Pod="calico-kube-controllers-79585c5f5c-9g8v9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.679698 env[1199]: 2025-05-15 10:39:56.665 [INFO][3413] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1fd5c9d0d82 ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Namespace="calico-system" Pod="calico-kube-controllers-79585c5f5c-9g8v9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.679698 env[1199]: 2025-05-15 10:39:56.669 [INFO][3413] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Namespace="calico-system" Pod="calico-kube-controllers-79585c5f5c-9g8v9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.679698 env[1199]: 2025-05-15 10:39:56.670 [INFO][3413] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Namespace="calico-system" Pod="calico-kube-controllers-79585c5f5c-9g8v9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0", GenerateName:"calico-kube-controllers-79585c5f5c-", Namespace:"calico-system", SelfLink:"", UID:"8c0e0e6f-cec1-4204-bbc8-838b712558a7", ResourceVersion:"866", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79585c5f5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332", Pod:"calico-kube-controllers-79585c5f5c-9g8v9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1fd5c9d0d82", MAC:"7a:5b:97:32:3f:3c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:56.679698 env[1199]: 2025-05-15 10:39:56.677 [INFO][3413] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332" Namespace="calico-system" Pod="calico-kube-controllers-79585c5f5c-9g8v9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:39:56.686000 audit[3448]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:56.686000 audit[3448]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffd189a6b00 a2=0 a3=7ffd189a6aec items=0 ppid=3172 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.686000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:56.692238 env[1199]: time="2025-05-15T10:39:56.692165961Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:56.692238 env[1199]: time="2025-05-15T10:39:56.692211109Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:56.692439 env[1199]: time="2025-05-15T10:39:56.692224404Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:56.692706 env[1199]: time="2025-05-15T10:39:56.692642539Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332 pid=3456 runtime=io.containerd.runc.v2 May 15 10:39:56.706162 systemd[1]: Started cri-containerd-542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332.scope. May 15 10:39:56.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.714000 audit: BPF prog-id=158 op=LOAD May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326430373461333361613537303439363032646337383835636333 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326430373461333361613537303439363032646337383835636333 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit: BPF prog-id=159 op=LOAD May 15 10:39:56.715000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0001e1d40 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326430373461333361613537303439363032646337383835636333 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit: BPF prog-id=160 op=LOAD May 15 10:39:56.715000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0001e1d88 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326430373461333361613537303439363032646337383835636333 May 15 10:39:56.715000 audit: BPF prog-id=160 op=UNLOAD May 15 10:39:56.715000 audit: BPF prog-id=159 op=UNLOAD May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { perfmon } for pid=3465 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit[3465]: AVC avc: denied { bpf } for pid=3465 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:56.715000 audit: BPF prog-id=161 op=LOAD May 15 10:39:56.715000 audit[3465]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003c8198 items=0 ppid=3456 pid=3465 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:56.715000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534326430373461333361613537303439363032646337383835636333 May 15 10:39:56.717439 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:56.741005 env[1199]: time="2025-05-15T10:39:56.740961361Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79585c5f5c-9g8v9,Uid:8c0e0e6f-cec1-4204-bbc8-838b712558a7,Namespace:calico-system,Attempt:1,} returns sandbox id \"542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332\"" May 15 10:39:56.742939 env[1199]: time="2025-05-15T10:39:56.742902181Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\"" May 15 10:39:56.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.55:22-10.0.0.1:43510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:56.981423 kernel: kauditd_printk_skb: 619 callbacks suppressed May 15 10:39:56.981456 kernel: audit: type=1130 audit(1747305596.979:1139): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.55:22-10.0.0.1:43510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:56.980041 systemd[1]: Started sshd@9-10.0.0.55:22-10.0.0.1:43510.service. May 15 10:39:57.013000 audit[3491]: USER_ACCT pid=3491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.014490 sshd[3491]: Accepted publickey for core from 10.0.0.1 port 43510 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:39:57.016296 sshd[3491]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:39:57.015000 audit[3491]: CRED_ACQ pid=3491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.019884 systemd-logind[1187]: New session 10 of user core. May 15 10:39:57.020841 systemd[1]: Started session-10.scope. May 15 10:39:57.022658 kernel: audit: type=1101 audit(1747305597.013:1140): pid=3491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.022723 kernel: audit: type=1103 audit(1747305597.015:1141): pid=3491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.022749 kernel: audit: type=1006 audit(1747305597.015:1142): pid=3491 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 May 15 10:39:57.015000 audit[3491]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbe46d860 a2=3 a3=0 items=0 ppid=1 pid=3491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.030649 kernel: audit: type=1300 audit(1747305597.015:1142): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbe46d860 a2=3 a3=0 items=0 ppid=1 pid=3491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:57.030723 kernel: audit: type=1327 audit(1747305597.015:1142): proctitle=737368643A20636F7265205B707269765D May 15 10:39:57.015000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:39:57.024000 audit[3491]: USER_START pid=3491 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.036025 kernel: audit: type=1105 audit(1747305597.024:1143): pid=3491 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.036064 kernel: audit: type=1103 audit(1747305597.026:1144): pid=3493 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.026000 audit[3493]: CRED_ACQ pid=3493 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.063945 systemd-networkd[1025]: vxlan.calico: Gained IPv6LL May 15 10:39:57.130448 sshd[3491]: pam_unix(sshd:session): session closed for user core May 15 10:39:57.130000 audit[3491]: USER_END pid=3491 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.132577 systemd[1]: sshd@9-10.0.0.55:22-10.0.0.1:43510.service: Deactivated successfully. May 15 10:39:57.133248 systemd[1]: session-10.scope: Deactivated successfully. May 15 10:39:57.133761 systemd-logind[1187]: Session 10 logged out. Waiting for processes to exit. May 15 10:39:57.134409 systemd-logind[1187]: Removed session 10. May 15 10:39:57.130000 audit[3491]: CRED_DISP pid=3491 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.139010 kernel: audit: type=1106 audit(1747305597.130:1145): pid=3491 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.139111 kernel: audit: type=1104 audit(1747305597.130:1146): pid=3491 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:39:57.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.55:22-10.0.0.1:43510 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:39:58.231938 env[1199]: time="2025-05-15T10:39:58.231884561Z" level=info msg="StopPodSandbox for \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\"" May 15 10:39:58.232317 env[1199]: time="2025-05-15T10:39:58.232200545Z" level=info msg="StopPodSandbox for \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\"" May 15 10:39:58.232529 env[1199]: time="2025-05-15T10:39:58.232488716Z" level=info msg="StopPodSandbox for \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\"" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.282 [INFO][3553] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.282 [INFO][3553] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" iface="eth0" netns="/var/run/netns/cni-be886e0d-f5c9-ef29-f7ab-9edc446ee27f" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.283 [INFO][3553] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" iface="eth0" netns="/var/run/netns/cni-be886e0d-f5c9-ef29-f7ab-9edc446ee27f" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.283 [INFO][3553] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" iface="eth0" netns="/var/run/netns/cni-be886e0d-f5c9-ef29-f7ab-9edc446ee27f" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.283 [INFO][3553] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.283 [INFO][3553] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.304 [INFO][3586] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.304 [INFO][3586] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.304 [INFO][3586] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.309 [WARNING][3586] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.309 [INFO][3586] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.310 [INFO][3586] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.315906 env[1199]: 2025-05-15 10:39:58.313 [INFO][3553] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:39:58.319556 env[1199]: time="2025-05-15T10:39:58.316057417Z" level=info msg="TearDown network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\" successfully" May 15 10:39:58.319556 env[1199]: time="2025-05-15T10:39:58.316087836Z" level=info msg="StopPodSandbox for \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\" returns successfully" May 15 10:39:58.319556 env[1199]: time="2025-05-15T10:39:58.319100306Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d59ff67f4-rqv6w,Uid:1142278d-8b06-4184-812a-ca4a647a625e,Namespace:calico-apiserver,Attempt:1,}" May 15 10:39:58.318848 systemd[1]: run-netns-cni\x2dbe886e0d\x2df5c9\x2def29\x2df7ab\x2d9edc446ee27f.mount: Deactivated successfully. May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.276 [INFO][3552] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.276 [INFO][3552] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" iface="eth0" netns="/var/run/netns/cni-8524a56e-b734-e98d-a484-e27aef4284b3" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.277 [INFO][3552] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" iface="eth0" netns="/var/run/netns/cni-8524a56e-b734-e98d-a484-e27aef4284b3" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.277 [INFO][3552] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" iface="eth0" netns="/var/run/netns/cni-8524a56e-b734-e98d-a484-e27aef4284b3" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.277 [INFO][3552] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.277 [INFO][3552] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.311 [INFO][3579] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.311 [INFO][3579] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.312 [INFO][3579] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.318 [WARNING][3579] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.318 [INFO][3579] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.320 [INFO][3579] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.322912 env[1199]: 2025-05-15 10:39:58.321 [INFO][3552] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:39:58.323345 env[1199]: time="2025-05-15T10:39:58.323054987Z" level=info msg="TearDown network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\" successfully" May 15 10:39:58.323345 env[1199]: time="2025-05-15T10:39:58.323086088Z" level=info msg="StopPodSandbox for \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\" returns successfully" May 15 10:39:58.323726 env[1199]: time="2025-05-15T10:39:58.323682639Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9psfb,Uid:7e870772-eaea-4b50-ab85-65106d357121,Namespace:calico-system,Attempt:1,}" May 15 10:39:58.325489 systemd[1]: run-netns-cni\x2d8524a56e\x2db734\x2de98d\x2da484\x2de27aef4284b3.mount: Deactivated successfully. May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.284 [INFO][3567] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.285 [INFO][3567] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" iface="eth0" netns="/var/run/netns/cni-c9ed45b2-1801-0924-8f50-113cc5ac43f9" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.285 [INFO][3567] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" iface="eth0" netns="/var/run/netns/cni-c9ed45b2-1801-0924-8f50-113cc5ac43f9" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.285 [INFO][3567] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" iface="eth0" netns="/var/run/netns/cni-c9ed45b2-1801-0924-8f50-113cc5ac43f9" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.285 [INFO][3567] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.285 [INFO][3567] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.325 [INFO][3588] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.326 [INFO][3588] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.326 [INFO][3588] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.332 [WARNING][3588] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.332 [INFO][3588] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.333 [INFO][3588] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.336599 env[1199]: 2025-05-15 10:39:58.335 [INFO][3567] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:39:58.340931 env[1199]: time="2025-05-15T10:39:58.338741979Z" level=info msg="TearDown network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\" successfully" May 15 10:39:58.340931 env[1199]: time="2025-05-15T10:39:58.338769973Z" level=info msg="StopPodSandbox for \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\" returns successfully" May 15 10:39:58.340931 env[1199]: time="2025-05-15T10:39:58.339407393Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-868hg,Uid:d0203667-e96b-4313-a901-2551d21cc694,Namespace:kube-system,Attempt:1,}" May 15 10:39:58.339423 systemd[1]: run-netns-cni\x2dc9ed45b2\x2d1801\x2d0924\x2d8f50\x2d113cc5ac43f9.mount: Deactivated successfully. May 15 10:39:58.341199 kubelet[1928]: E0515 10:39:58.339079 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:58.452186 systemd-networkd[1025]: cali2bd7a8e932f: Link UP May 15 10:39:58.454867 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:58.454990 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2bd7a8e932f: link becomes ready May 15 10:39:58.455096 systemd-networkd[1025]: cali2bd7a8e932f: Gained carrier May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.376 [INFO][3604] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0 calico-apiserver-6d59ff67f4- calico-apiserver 1142278d-8b06-4184-812a-ca4a647a625e 882 0 2025-05-15 10:39:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d59ff67f4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6d59ff67f4-rqv6w eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2bd7a8e932f [] []}} ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-rqv6w" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.376 [INFO][3604] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-rqv6w" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.417 [INFO][3639] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" HandleID="k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.426 [INFO][3639] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" HandleID="k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027f800), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6d59ff67f4-rqv6w", "timestamp":"2025-05-15 10:39:58.417078964 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.426 [INFO][3639] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.426 [INFO][3639] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.426 [INFO][3639] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.428 [INFO][3639] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.431 [INFO][3639] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.435 [INFO][3639] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.436 [INFO][3639] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.438 [INFO][3639] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.438 [INFO][3639] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.440 [INFO][3639] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.443 [INFO][3639] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.448 [INFO][3639] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.448 [INFO][3639] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" host="localhost" May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.448 [INFO][3639] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.465844 env[1199]: 2025-05-15 10:39:58.448 [INFO][3639] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" HandleID="k8s-pod-network.8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.466660 env[1199]: 2025-05-15 10:39:58.450 [INFO][3604] cni-plugin/k8s.go 386: Populated endpoint ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-rqv6w" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0", GenerateName:"calico-apiserver-6d59ff67f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"1142278d-8b06-4184-812a-ca4a647a625e", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d59ff67f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6d59ff67f4-rqv6w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2bd7a8e932f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.466660 env[1199]: 2025-05-15 10:39:58.450 [INFO][3604] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-rqv6w" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.466660 env[1199]: 2025-05-15 10:39:58.450 [INFO][3604] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali2bd7a8e932f ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-rqv6w" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.466660 env[1199]: 2025-05-15 10:39:58.455 [INFO][3604] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-rqv6w" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.466660 env[1199]: 2025-05-15 10:39:58.455 [INFO][3604] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-rqv6w" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0", GenerateName:"calico-apiserver-6d59ff67f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"1142278d-8b06-4184-812a-ca4a647a625e", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d59ff67f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb", Pod:"calico-apiserver-6d59ff67f4-rqv6w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2bd7a8e932f", MAC:"e2:d2:49:77:a8:f2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.466660 env[1199]: 2025-05-15 10:39:58.464 [INFO][3604] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-rqv6w" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:39:58.473000 audit[3687]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=3687 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:58.473000 audit[3687]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffe830473e0 a2=0 a3=7ffe830473cc items=0 ppid=3172 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.473000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:58.479112 env[1199]: time="2025-05-15T10:39:58.479005070Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:58.479112 env[1199]: time="2025-05-15T10:39:58.479068404Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:58.479112 env[1199]: time="2025-05-15T10:39:58.479078313Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:58.479378 env[1199]: time="2025-05-15T10:39:58.479296748Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb pid=3696 runtime=io.containerd.runc.v2 May 15 10:39:58.490669 systemd[1]: Started cri-containerd-8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb.scope. May 15 10:39:58.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.501000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit: BPF prog-id=162 op=LOAD May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3696 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646232663066623861323362343332613937313833333066643165 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3696 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646232663066623861323362343332613937313833333066643165 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit: BPF prog-id=163 op=LOAD May 15 10:39:58.502000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00023b0b0 items=0 ppid=3696 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646232663066623861323362343332613937313833333066643165 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit: BPF prog-id=164 op=LOAD May 15 10:39:58.502000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00023b0f8 items=0 ppid=3696 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646232663066623861323362343332613937313833333066643165 May 15 10:39:58.502000 audit: BPF prog-id=164 op=UNLOAD May 15 10:39:58.502000 audit: BPF prog-id=163 op=UNLOAD May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { perfmon } for pid=3705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit[3705]: AVC avc: denied { bpf } for pid=3705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.502000 audit: BPF prog-id=165 op=LOAD May 15 10:39:58.502000 audit[3705]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00023b508 items=0 ppid=3696 pid=3705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862646232663066623861323362343332613937313833333066643165 May 15 10:39:58.504090 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:58.523461 env[1199]: time="2025-05-15T10:39:58.523432973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d59ff67f4-rqv6w,Uid:1142278d-8b06-4184-812a-ca4a647a625e,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb\"" May 15 10:39:58.650633 systemd-networkd[1025]: cali33bdef1d092: Link UP May 15 10:39:58.652464 systemd-networkd[1025]: cali33bdef1d092: Gained carrier May 15 10:39:58.653123 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali33bdef1d092: link becomes ready May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.383 [INFO][3614] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--9psfb-eth0 csi-node-driver- calico-system 7e870772-eaea-4b50-ab85-65106d357121 881 0 2025-05-15 10:39:21 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:5bcd8f69 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s localhost csi-node-driver-9psfb eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali33bdef1d092 [] []}} ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Namespace="calico-system" Pod="csi-node-driver-9psfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--9psfb-" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.383 [INFO][3614] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Namespace="calico-system" Pod="csi-node-driver-9psfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.420 [INFO][3650] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" HandleID="k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.426 [INFO][3650] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" HandleID="k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002fd570), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-9psfb", "timestamp":"2025-05-15 10:39:58.420723904 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.426 [INFO][3650] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.448 [INFO][3650] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.448 [INFO][3650] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.529 [INFO][3650] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.627 [INFO][3650] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.631 [INFO][3650] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.633 [INFO][3650] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.635 [INFO][3650] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.635 [INFO][3650] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.636 [INFO][3650] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.640 [INFO][3650] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.645 [INFO][3650] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.645 [INFO][3650] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" host="localhost" May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.646 [INFO][3650] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.663093 env[1199]: 2025-05-15 10:39:58.646 [INFO][3650] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" HandleID="k8s-pod-network.48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.663625 env[1199]: 2025-05-15 10:39:58.648 [INFO][3614] cni-plugin/k8s.go 386: Populated endpoint ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Namespace="calico-system" Pod="csi-node-driver-9psfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--9psfb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9psfb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7e870772-eaea-4b50-ab85-65106d357121", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-9psfb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali33bdef1d092", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.663625 env[1199]: 2025-05-15 10:39:58.649 [INFO][3614] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Namespace="calico-system" Pod="csi-node-driver-9psfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.663625 env[1199]: 2025-05-15 10:39:58.649 [INFO][3614] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali33bdef1d092 ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Namespace="calico-system" Pod="csi-node-driver-9psfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.663625 env[1199]: 2025-05-15 10:39:58.652 [INFO][3614] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Namespace="calico-system" Pod="csi-node-driver-9psfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.663625 env[1199]: 2025-05-15 10:39:58.652 [INFO][3614] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Namespace="calico-system" Pod="csi-node-driver-9psfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--9psfb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9psfb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7e870772-eaea-4b50-ab85-65106d357121", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c", Pod:"csi-node-driver-9psfb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali33bdef1d092", MAC:"9e:40:06:57:94:de", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.663625 env[1199]: 2025-05-15 10:39:58.661 [INFO][3614] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c" Namespace="calico-system" Pod="csi-node-driver-9psfb" WorkloadEndpoint="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:39:58.663909 systemd-networkd[1025]: cali1fd5c9d0d82: Gained IPv6LL May 15 10:39:58.672000 audit[3742]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=3742 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:58.672000 audit[3742]: SYSCALL arch=c000003e syscall=46 success=yes exit=19828 a0=3 a1=7ffdbc793780 a2=0 a3=7ffdbc79376c items=0 ppid=3172 pid=3742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.672000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:58.675454 env[1199]: time="2025-05-15T10:39:58.675393115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:58.675578 env[1199]: time="2025-05-15T10:39:58.675435898Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:58.675578 env[1199]: time="2025-05-15T10:39:58.675446389Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:58.675665 env[1199]: time="2025-05-15T10:39:58.675569609Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c pid=3750 runtime=io.containerd.runc.v2 May 15 10:39:58.685016 systemd[1]: Started cri-containerd-48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c.scope. May 15 10:39:58.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.692000 audit: BPF prog-id=166 op=LOAD May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656464343334333431633830396161633965626664393430353965 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656464343334333431633830396161633965626664393430353965 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit: BPF prog-id=167 op=LOAD May 15 10:39:58.693000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001dd830 items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656464343334333431633830396161633965626664393430353965 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit: BPF prog-id=168 op=LOAD May 15 10:39:58.693000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001dd878 items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656464343334333431633830396161633965626664393430353965 May 15 10:39:58.693000 audit: BPF prog-id=168 op=UNLOAD May 15 10:39:58.693000 audit: BPF prog-id=167 op=UNLOAD May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { perfmon } for pid=3759 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit[3759]: AVC avc: denied { bpf } for pid=3759 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.693000 audit: BPF prog-id=169 op=LOAD May 15 10:39:58.693000 audit[3759]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001ddc88 items=0 ppid=3750 pid=3759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438656464343334333431633830396161633965626664393430353965 May 15 10:39:58.695363 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:58.703105 env[1199]: time="2025-05-15T10:39:58.703054005Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-9psfb,Uid:7e870772-eaea-4b50-ab85-65106d357121,Namespace:calico-system,Attempt:1,} returns sandbox id \"48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c\"" May 15 10:39:58.750513 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali0fc0133d9a7: link becomes ready May 15 10:39:58.748155 systemd-networkd[1025]: cali0fc0133d9a7: Link UP May 15 10:39:58.749692 systemd-networkd[1025]: cali0fc0133d9a7: Gained carrier May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.426 [INFO][3631] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--868hg-eth0 coredns-6f6b679f8f- kube-system d0203667-e96b-4313-a901-2551d21cc694 883 0 2025-05-15 10:39:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-868hg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali0fc0133d9a7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Namespace="kube-system" Pod="coredns-6f6b679f8f-868hg" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--868hg-" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.426 [INFO][3631] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Namespace="kube-system" Pod="coredns-6f6b679f8f-868hg" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.468 [INFO][3664] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" HandleID="k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.626 [INFO][3664] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" HandleID="k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000365670), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-868hg", "timestamp":"2025-05-15 10:39:58.468767819 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.627 [INFO][3664] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.645 [INFO][3664] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.645 [INFO][3664] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.648 [INFO][3664] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.727 [INFO][3664] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.731 [INFO][3664] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.733 [INFO][3664] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.735 [INFO][3664] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.735 [INFO][3664] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.736 [INFO][3664] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.740 [INFO][3664] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.744 [INFO][3664] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.744 [INFO][3664] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" host="localhost" May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.744 [INFO][3664] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:58.761767 env[1199]: 2025-05-15 10:39:58.744 [INFO][3664] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" HandleID="k8s-pod-network.184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.762354 env[1199]: 2025-05-15 10:39:58.746 [INFO][3631] cni-plugin/k8s.go 386: Populated endpoint ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Namespace="kube-system" Pod="coredns-6f6b679f8f-868hg" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--868hg-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"d0203667-e96b-4313-a901-2551d21cc694", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-868hg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0fc0133d9a7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.762354 env[1199]: 2025-05-15 10:39:58.746 [INFO][3631] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Namespace="kube-system" Pod="coredns-6f6b679f8f-868hg" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.762354 env[1199]: 2025-05-15 10:39:58.746 [INFO][3631] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali0fc0133d9a7 ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Namespace="kube-system" Pod="coredns-6f6b679f8f-868hg" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.762354 env[1199]: 2025-05-15 10:39:58.749 [INFO][3631] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Namespace="kube-system" Pod="coredns-6f6b679f8f-868hg" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.762354 env[1199]: 2025-05-15 10:39:58.749 [INFO][3631] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Namespace="kube-system" Pod="coredns-6f6b679f8f-868hg" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--868hg-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"d0203667-e96b-4313-a901-2551d21cc694", ResourceVersion:"883", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d", Pod:"coredns-6f6b679f8f-868hg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0fc0133d9a7", MAC:"ca:a5:7c:47:44:e7", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:58.762354 env[1199]: 2025-05-15 10:39:58.760 [INFO][3631] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d" Namespace="kube-system" Pod="coredns-6f6b679f8f-868hg" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:39:58.768000 audit[3797]: NETFILTER_CFG table=filter:108 family=2 entries=46 op=nft_register_chain pid=3797 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:58.768000 audit[3797]: SYSCALL arch=c000003e syscall=46 success=yes exit=22712 a0=3 a1=7ffd6dd118d0 a2=0 a3=7ffd6dd118bc items=0 ppid=3172 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.768000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:58.773495 env[1199]: time="2025-05-15T10:39:58.773421100Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:58.773495 env[1199]: time="2025-05-15T10:39:58.773468021Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:58.773495 env[1199]: time="2025-05-15T10:39:58.773478682Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:58.773847 env[1199]: time="2025-05-15T10:39:58.773775129Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d pid=3805 runtime=io.containerd.runc.v2 May 15 10:39:58.785161 systemd[1]: Started cri-containerd-184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d.scope. May 15 10:39:58.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.796000 audit: BPF prog-id=170 op=LOAD May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3805 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346462363061393061616462393738343332333435313733396538 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3805 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346462363061393061616462393738343332333435313733396538 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit: BPF prog-id=171 op=LOAD May 15 10:39:58.797000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000302a50 items=0 ppid=3805 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346462363061393061616462393738343332333435313733396538 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit: BPF prog-id=172 op=LOAD May 15 10:39:58.797000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000302a98 items=0 ppid=3805 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346462363061393061616462393738343332333435313733396538 May 15 10:39:58.797000 audit: BPF prog-id=172 op=UNLOAD May 15 10:39:58.797000 audit: BPF prog-id=171 op=UNLOAD May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { perfmon } for pid=3815 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit[3815]: AVC avc: denied { bpf } for pid=3815 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.797000 audit: BPF prog-id=173 op=LOAD May 15 10:39:58.797000 audit[3815]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000302ea8 items=0 ppid=3805 pid=3815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3138346462363061393061616462393738343332333435313733396538 May 15 10:39:58.798943 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:58.820478 env[1199]: time="2025-05-15T10:39:58.820444520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-868hg,Uid:d0203667-e96b-4313-a901-2551d21cc694,Namespace:kube-system,Attempt:1,} returns sandbox id \"184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d\"" May 15 10:39:58.821264 kubelet[1928]: E0515 10:39:58.821240 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:58.823882 env[1199]: time="2025-05-15T10:39:58.823856837Z" level=info msg="CreateContainer within sandbox \"184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:39:58.844754 env[1199]: time="2025-05-15T10:39:58.844698374Z" level=info msg="CreateContainer within sandbox \"184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"33d48e5f1563a5412835fa4bb972747201cae7aa0a4097d68f1fc0361f1b5230\"" May 15 10:39:58.845210 env[1199]: time="2025-05-15T10:39:58.845167045Z" level=info msg="StartContainer for \"33d48e5f1563a5412835fa4bb972747201cae7aa0a4097d68f1fc0361f1b5230\"" May 15 10:39:58.858310 systemd[1]: Started cri-containerd-33d48e5f1563a5412835fa4bb972747201cae7aa0a4097d68f1fc0361f1b5230.scope. May 15 10:39:58.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit: BPF prog-id=174 op=LOAD May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3805 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643438653566313536336135343132383335666134626239373237 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3805 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643438653566313536336135343132383335666134626239373237 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit: BPF prog-id=175 op=LOAD May 15 10:39:58.871000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c5e10 items=0 ppid=3805 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643438653566313536336135343132383335666134626239373237 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.871000 audit: BPF prog-id=176 op=LOAD May 15 10:39:58.871000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c5e58 items=0 ppid=3805 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643438653566313536336135343132383335666134626239373237 May 15 10:39:58.872000 audit: BPF prog-id=176 op=UNLOAD May 15 10:39:58.872000 audit: BPF prog-id=175 op=UNLOAD May 15 10:39:58.872000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { perfmon } for pid=3844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit[3844]: AVC avc: denied { bpf } for pid=3844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:58.872000 audit: BPF prog-id=177 op=LOAD May 15 10:39:58.872000 audit[3844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000406268 items=0 ppid=3805 pid=3844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:58.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3333643438653566313536336135343132383335666134626239373237 May 15 10:39:58.885202 env[1199]: time="2025-05-15T10:39:58.885165393Z" level=info msg="StartContainer for \"33d48e5f1563a5412835fa4bb972747201cae7aa0a4097d68f1fc0361f1b5230\" returns successfully" May 15 10:39:59.231820 env[1199]: time="2025-05-15T10:39:59.231755595Z" level=info msg="StopPodSandbox for \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\"" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.347 [INFO][3891] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.347 [INFO][3891] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" iface="eth0" netns="/var/run/netns/cni-46bb28f3-9bb5-06cf-1ab4-f1c5da37326b" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.347 [INFO][3891] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" iface="eth0" netns="/var/run/netns/cni-46bb28f3-9bb5-06cf-1ab4-f1c5da37326b" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.347 [INFO][3891] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" iface="eth0" netns="/var/run/netns/cni-46bb28f3-9bb5-06cf-1ab4-f1c5da37326b" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.347 [INFO][3891] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.347 [INFO][3891] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.452 [INFO][3899] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.452 [INFO][3899] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.452 [INFO][3899] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.457 [WARNING][3899] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.457 [INFO][3899] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.458 [INFO][3899] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:59.463204 env[1199]: 2025-05-15 10:39:59.461 [INFO][3891] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:39:59.465571 systemd[1]: run-netns-cni\x2d46bb28f3\x2d9bb5\x2d06cf\x2d1ab4\x2df1c5da37326b.mount: Deactivated successfully. May 15 10:39:59.465792 env[1199]: time="2025-05-15T10:39:59.465631725Z" level=info msg="TearDown network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\" successfully" May 15 10:39:59.465792 env[1199]: time="2025-05-15T10:39:59.465663297Z" level=info msg="StopPodSandbox for \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\" returns successfully" May 15 10:39:59.466015 kubelet[1928]: E0515 10:39:59.465989 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:59.466672 env[1199]: time="2025-05-15T10:39:59.466642059Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-h27s2,Uid:511be6b8-cb1d-49b9-97c8-78c9294ffecb,Namespace:kube-system,Attempt:1,}" May 15 10:39:59.497007 systemd-networkd[1025]: cali2bd7a8e932f: Gained IPv6LL May 15 10:39:59.583168 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready May 15 10:39:59.583317 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali147ce168ecf: link becomes ready May 15 10:39:59.579223 systemd-networkd[1025]: cali147ce168ecf: Link UP May 15 10:39:59.581994 systemd-networkd[1025]: cali147ce168ecf: Gained carrier May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.517 [INFO][3907] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--6f6b679f8f--h27s2-eth0 coredns-6f6b679f8f- kube-system 511be6b8-cb1d-49b9-97c8-78c9294ffecb 903 0 2025-05-15 10:39:12 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-6f6b679f8f-h27s2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali147ce168ecf [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Namespace="kube-system" Pod="coredns-6f6b679f8f-h27s2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h27s2-" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.517 [INFO][3907] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Namespace="kube-system" Pod="coredns-6f6b679f8f-h27s2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.541 [INFO][3922] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" HandleID="k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.549 [INFO][3922] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" HandleID="k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ab3d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-6f6b679f8f-h27s2", "timestamp":"2025-05-15 10:39:59.541164059 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.549 [INFO][3922] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.549 [INFO][3922] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.549 [INFO][3922] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.551 [INFO][3922] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.554 [INFO][3922] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.559 [INFO][3922] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.561 [INFO][3922] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.563 [INFO][3922] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.563 [INFO][3922] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.564 [INFO][3922] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.569 [INFO][3922] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.574 [INFO][3922] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.574 [INFO][3922] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" host="localhost" May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.574 [INFO][3922] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:39:59.593609 env[1199]: 2025-05-15 10:39:59.574 [INFO][3922] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" HandleID="k8s-pod-network.144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.594603 env[1199]: 2025-05-15 10:39:59.576 [INFO][3907] cni-plugin/k8s.go 386: Populated endpoint ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Namespace="kube-system" Pod="coredns-6f6b679f8f-h27s2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--h27s2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"511be6b8-cb1d-49b9-97c8-78c9294ffecb", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-6f6b679f8f-h27s2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali147ce168ecf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:59.594603 env[1199]: 2025-05-15 10:39:59.576 [INFO][3907] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.133/32] ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Namespace="kube-system" Pod="coredns-6f6b679f8f-h27s2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.594603 env[1199]: 2025-05-15 10:39:59.576 [INFO][3907] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali147ce168ecf ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Namespace="kube-system" Pod="coredns-6f6b679f8f-h27s2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.594603 env[1199]: 2025-05-15 10:39:59.582 [INFO][3907] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Namespace="kube-system" Pod="coredns-6f6b679f8f-h27s2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.594603 env[1199]: 2025-05-15 10:39:59.582 [INFO][3907] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Namespace="kube-system" Pod="coredns-6f6b679f8f-h27s2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--h27s2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"511be6b8-cb1d-49b9-97c8-78c9294ffecb", ResourceVersion:"903", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d", Pod:"coredns-6f6b679f8f-h27s2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali147ce168ecf", MAC:"22:96:64:c1:f1:57", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:39:59.594603 env[1199]: 2025-05-15 10:39:59.591 [INFO][3907] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d" Namespace="kube-system" Pod="coredns-6f6b679f8f-h27s2" WorkloadEndpoint="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:39:59.599000 audit[3939]: NETFILTER_CFG table=filter:109 family=2 entries=48 op=nft_register_chain pid=3939 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:39:59.599000 audit[3939]: SYSCALL arch=c000003e syscall=46 success=yes exit=23448 a0=3 a1=7ffda3f2e9a0 a2=0 a3=7ffda3f2e98c items=0 ppid=3172 pid=3939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.599000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:39:59.610436 env[1199]: time="2025-05-15T10:39:59.610366038Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:39:59.610436 env[1199]: time="2025-05-15T10:39:59.610418058Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:39:59.610436 env[1199]: time="2025-05-15T10:39:59.610430583Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:39:59.610695 env[1199]: time="2025-05-15T10:39:59.610646653Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d pid=3951 runtime=io.containerd.runc.v2 May 15 10:39:59.638178 systemd[1]: Started cri-containerd-144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d.scope. May 15 10:39:59.648853 kubelet[1928]: E0515 10:39:59.648823 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:59.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.649000 audit: BPF prog-id=178 op=LOAD May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3951 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134346132336266366665646535323736643662316263306566643030 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3951 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134346132336266366665646535323736643662316263306566643030 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit: BPF prog-id=179 op=LOAD May 15 10:39:59.650000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003d8d30 items=0 ppid=3951 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134346132336266366665646535323736643662316263306566643030 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit: BPF prog-id=180 op=LOAD May 15 10:39:59.650000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003d8d78 items=0 ppid=3951 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134346132336266366665646535323736643662316263306566643030 May 15 10:39:59.650000 audit: BPF prog-id=180 op=UNLOAD May 15 10:39:59.650000 audit: BPF prog-id=179 op=UNLOAD May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { perfmon } for pid=3961 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit[3961]: AVC avc: denied { bpf } for pid=3961 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.650000 audit: BPF prog-id=181 op=LOAD May 15 10:39:59.650000 audit[3961]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003d9188 items=0 ppid=3951 pid=3961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3134346132336266366665646535323736643662316263306566643030 May 15 10:39:59.651709 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:39:59.662863 kubelet[1928]: I0515 10:39:59.662535 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-868hg" podStartSLOduration=47.662515148 podStartE2EDuration="47.662515148s" podCreationTimestamp="2025-05-15 10:39:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:39:59.662041897 +0000 UTC m=+52.529728202" watchObservedRunningTime="2025-05-15 10:39:59.662515148 +0000 UTC m=+52.530201443" May 15 10:39:59.696556 env[1199]: time="2025-05-15T10:39:59.696503185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-h27s2,Uid:511be6b8-cb1d-49b9-97c8-78c9294ffecb,Namespace:kube-system,Attempt:1,} returns sandbox id \"144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d\"" May 15 10:39:59.697671 kubelet[1928]: E0515 10:39:59.697276 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:39:59.698839 env[1199]: time="2025-05-15T10:39:59.698814198Z" level=info msg="CreateContainer within sandbox \"144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" May 15 10:39:59.710000 audit[3985]: NETFILTER_CFG table=filter:110 family=2 entries=16 op=nft_register_rule pid=3985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:59.710000 audit[3985]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7fffa9b4a100 a2=0 a3=7fffa9b4a0ec items=0 ppid=2074 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.710000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:59.719000 audit[3985]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=3985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:59.719000 audit[3985]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffa9b4a100 a2=0 a3=0 items=0 ppid=2074 pid=3985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.719000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:59.731000 audit[3987]: NETFILTER_CFG table=filter:112 family=2 entries=13 op=nft_register_rule pid=3987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:59.731000 audit[3987]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd16a3f140 a2=0 a3=7ffd16a3f12c items=0 ppid=2074 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:59.737000 audit[3987]: NETFILTER_CFG table=nat:113 family=2 entries=35 op=nft_register_chain pid=3987 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:39:59.737000 audit[3987]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffd16a3f140 a2=0 a3=7ffd16a3f12c items=0 ppid=2074 pid=3987 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:39:59.829231 env[1199]: time="2025-05-15T10:39:59.829170511Z" level=info msg="CreateContainer within sandbox \"144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"c7a2e319e578f37db87ecb47572d0026dc7d468c82a2ca66f2043994fa31c38b\"" May 15 10:39:59.830017 env[1199]: time="2025-05-15T10:39:59.829944725Z" level=info msg="StartContainer for \"c7a2e319e578f37db87ecb47572d0026dc7d468c82a2ca66f2043994fa31c38b\"" May 15 10:39:59.845323 systemd[1]: Started cri-containerd-c7a2e319e578f37db87ecb47572d0026dc7d468c82a2ca66f2043994fa31c38b.scope. May 15 10:39:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.857000 audit: BPF prog-id=182 op=LOAD May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3951 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613265333139653537386633376462383765636234373537326430 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3951 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613265333139653537386633376462383765636234373537326430 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit: BPF prog-id=183 op=LOAD May 15 10:39:59.859000 audit[3996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0001df710 items=0 ppid=3951 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613265333139653537386633376462383765636234373537326430 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit: BPF prog-id=184 op=LOAD May 15 10:39:59.859000 audit[3996]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0001df758 items=0 ppid=3951 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613265333139653537386633376462383765636234373537326430 May 15 10:39:59.859000 audit: BPF prog-id=184 op=UNLOAD May 15 10:39:59.859000 audit: BPF prog-id=183 op=UNLOAD May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { perfmon } for pid=3996 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit[3996]: AVC avc: denied { bpf } for pid=3996 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:39:59.859000 audit: BPF prog-id=185 op=LOAD May 15 10:39:59.859000 audit[3996]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0001dfb68 items=0 ppid=3951 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:39:59.859000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337613265333139653537386633376462383765636234373537326430 May 15 10:39:59.881222 env[1199]: time="2025-05-15T10:39:59.881186492Z" level=info msg="StartContainer for \"c7a2e319e578f37db87ecb47572d0026dc7d468c82a2ca66f2043994fa31c38b\" returns successfully" May 15 10:40:00.231525 env[1199]: time="2025-05-15T10:40:00.231411099Z" level=info msg="StopPodSandbox for \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\"" May 15 10:40:00.264976 systemd-networkd[1025]: cali0fc0133d9a7: Gained IPv6LL May 15 10:40:00.327029 env[1199]: time="2025-05-15T10:40:00.326975840Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:00.329221 env[1199]: time="2025-05-15T10:40:00.329163770Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:00.331925 env[1199]: time="2025-05-15T10:40:00.331874597Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:00.333585 env[1199]: time="2025-05-15T10:40:00.333534471Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:feaab0197035d474845e0f8137a99a78cab274f0a3cac4d5485cf9b1bdf9ffa9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:00.334083 env[1199]: time="2025-05-15T10:40:00.334018472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.3\" returns image reference \"sha256:4e982138231b3653a012db4f21ed5e7be69afd5f553dba38cf7e88f0ed740b94\"" May 15 10:40:00.337247 env[1199]: time="2025-05-15T10:40:00.337212677Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:40:00.348603 env[1199]: time="2025-05-15T10:40:00.348561826Z" level=info msg="CreateContainer within sandbox \"542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" May 15 10:40:00.366431 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1101273511.mount: Deactivated successfully. May 15 10:40:00.369322 env[1199]: time="2025-05-15T10:40:00.369272903Z" level=info msg="CreateContainer within sandbox \"542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"fbe4cb80c8044667b5d3280aa5c11032087785b961f7222a30d9444f9e2491f6\"" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.334 [INFO][4047] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.334 [INFO][4047] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" iface="eth0" netns="/var/run/netns/cni-90c0c865-8c72-7473-d202-fd74fab46438" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.334 [INFO][4047] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" iface="eth0" netns="/var/run/netns/cni-90c0c865-8c72-7473-d202-fd74fab46438" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.335 [INFO][4047] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" iface="eth0" netns="/var/run/netns/cni-90c0c865-8c72-7473-d202-fd74fab46438" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.335 [INFO][4047] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.335 [INFO][4047] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.356 [INFO][4055] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.356 [INFO][4055] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.356 [INFO][4055] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.362 [WARNING][4055] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.362 [INFO][4055] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.364 [INFO][4055] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:00.370729 env[1199]: 2025-05-15 10:40:00.369 [INFO][4047] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:00.371380 env[1199]: time="2025-05-15T10:40:00.370757677Z" level=info msg="StartContainer for \"fbe4cb80c8044667b5d3280aa5c11032087785b961f7222a30d9444f9e2491f6\"" May 15 10:40:00.371380 env[1199]: time="2025-05-15T10:40:00.370970420Z" level=info msg="TearDown network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\" successfully" May 15 10:40:00.371380 env[1199]: time="2025-05-15T10:40:00.371004427Z" level=info msg="StopPodSandbox for \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\" returns successfully" May 15 10:40:00.374418 env[1199]: time="2025-05-15T10:40:00.374381689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d59ff67f4-xzd78,Uid:fe2d5227-eb07-415c-8504-c8ed4ba92582,Namespace:calico-apiserver,Attempt:1,}" May 15 10:40:00.386604 systemd[1]: Started cri-containerd-fbe4cb80c8044667b5d3280aa5c11032087785b961f7222a30d9444f9e2491f6.scope. May 15 10:40:00.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.406000 audit: BPF prog-id=186 op=LOAD May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3456 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653463623830633830343436363762356433323830616135633131 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3456 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653463623830633830343436363762356433323830616135633131 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit: BPF prog-id=187 op=LOAD May 15 10:40:00.407000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219950 items=0 ppid=3456 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653463623830633830343436363762356433323830616135633131 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.407000 audit: BPF prog-id=188 op=LOAD May 15 10:40:00.407000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219998 items=0 ppid=3456 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.407000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653463623830633830343436363762356433323830616135633131 May 15 10:40:00.411000 audit: BPF prog-id=188 op=UNLOAD May 15 10:40:00.411000 audit: BPF prog-id=187 op=UNLOAD May 15 10:40:00.411000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { perfmon } for pid=4072 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit[4072]: AVC avc: denied { bpf } for pid=4072 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.411000 audit: BPF prog-id=189 op=LOAD May 15 10:40:00.411000 audit[4072]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219da8 items=0 ppid=3456 pid=4072 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.411000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662653463623830633830343436363762356433323830616135633131 May 15 10:40:00.536383 env[1199]: time="2025-05-15T10:40:00.536344034Z" level=info msg="StartContainer for \"fbe4cb80c8044667b5d3280aa5c11032087785b961f7222a30d9444f9e2491f6\" returns successfully" May 15 10:40:00.545750 systemd-networkd[1025]: cali8017327f12e: Link UP May 15 10:40:00.548187 systemd-networkd[1025]: cali8017327f12e: Gained carrier May 15 10:40:00.548835 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8017327f12e: link becomes ready May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.436 [INFO][4088] cni-plugin/plugin.go 340: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0 calico-apiserver-6d59ff67f4- calico-apiserver fe2d5227-eb07-415c-8504-c8ed4ba92582 930 0 2025-05-15 10:39:21 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6d59ff67f4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-6d59ff67f4-xzd78 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali8017327f12e [] []}} ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-xzd78" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.436 [INFO][4088] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-xzd78" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.461 [INFO][4113] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" HandleID="k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.470 [INFO][4113] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" HandleID="k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002f5830), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-6d59ff67f4-xzd78", "timestamp":"2025-05-15 10:40:00.461699647 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.470 [INFO][4113] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.470 [INFO][4113] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.470 [INFO][4113] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.497 [INFO][4113] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.512 [INFO][4113] ipam/ipam.go 372: Looking up existing affinities for host host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.516 [INFO][4113] ipam/ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.518 [INFO][4113] ipam/ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.520 [INFO][4113] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.520 [INFO][4113] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.521 [INFO][4113] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1 May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.535 [INFO][4113] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.541 [INFO][4113] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.88.134/26] block=192.168.88.128/26 handle="k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.541 [INFO][4113] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.134/26] handle="k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" host="localhost" May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.541 [INFO][4113] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:00.560400 env[1199]: 2025-05-15 10:40:00.541 [INFO][4113] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.88.134/26] IPv6=[] ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" HandleID="k8s-pod-network.68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.560999 env[1199]: 2025-05-15 10:40:00.543 [INFO][4088] cni-plugin/k8s.go 386: Populated endpoint ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-xzd78" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0", GenerateName:"calico-apiserver-6d59ff67f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2d5227-eb07-415c-8504-c8ed4ba92582", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d59ff67f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-6d59ff67f4-xzd78", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8017327f12e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:00.560999 env[1199]: 2025-05-15 10:40:00.543 [INFO][4088] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.88.134/32] ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-xzd78" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.560999 env[1199]: 2025-05-15 10:40:00.543 [INFO][4088] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali8017327f12e ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-xzd78" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.560999 env[1199]: 2025-05-15 10:40:00.550 [INFO][4088] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-xzd78" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.560999 env[1199]: 2025-05-15 10:40:00.550 [INFO][4088] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-xzd78" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0", GenerateName:"calico-apiserver-6d59ff67f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2d5227-eb07-415c-8504-c8ed4ba92582", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d59ff67f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1", Pod:"calico-apiserver-6d59ff67f4-xzd78", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8017327f12e", MAC:"b2:2e:44:ee:c3:92", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:00.560999 env[1199]: 2025-05-15 10:40:00.557 [INFO][4088] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1" Namespace="calico-apiserver" Pod="calico-apiserver-6d59ff67f4-xzd78" WorkloadEndpoint="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:00.573316 env[1199]: time="2025-05-15T10:40:00.573234044Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 May 15 10:40:00.573502 env[1199]: time="2025-05-15T10:40:00.573479480Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 May 15 10:40:00.573616 env[1199]: time="2025-05-15T10:40:00.573594363Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 May 15 10:40:00.573946 env[1199]: time="2025-05-15T10:40:00.573885770Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1 pid=4143 runtime=io.containerd.runc.v2 May 15 10:40:00.577000 audit[4144]: NETFILTER_CFG table=filter:114 family=2 entries=46 op=nft_register_chain pid=4144 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" May 15 10:40:00.577000 audit[4144]: SYSCALL arch=c000003e syscall=46 success=yes exit=23876 a0=3 a1=7ffcecdb4920 a2=0 a3=7ffcecdb490c items=0 ppid=3172 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.577000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 May 15 10:40:00.584102 systemd[1]: Started cri-containerd-68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1.scope. May 15 10:40:00.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.595000 audit: BPF prog-id=190 op=LOAD May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4143 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638626162306438313230326134363436373137613034303465663465 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4143 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638626162306438313230326134363436373137613034303465663465 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit: BPF prog-id=191 op=LOAD May 15 10:40:00.596000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000261ce0 items=0 ppid=4143 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638626162306438313230326134363436373137613034303465663465 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit: BPF prog-id=192 op=LOAD May 15 10:40:00.596000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000261d28 items=0 ppid=4143 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638626162306438313230326134363436373137613034303465663465 May 15 10:40:00.596000 audit: BPF prog-id=192 op=UNLOAD May 15 10:40:00.596000 audit: BPF prog-id=191 op=UNLOAD May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { perfmon } for pid=4153 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit[4153]: AVC avc: denied { bpf } for pid=4153 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:00.596000 audit: BPF prog-id=193 op=LOAD May 15 10:40:00.596000 audit[4153]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000462138 items=0 ppid=4143 pid=4153 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3638626162306438313230326134363436373137613034303465663465 May 15 10:40:00.598939 systemd-resolved[1147]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address May 15 10:40:00.619289 env[1199]: time="2025-05-15T10:40:00.619250584Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6d59ff67f4-xzd78,Uid:fe2d5227-eb07-415c-8504-c8ed4ba92582,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1\"" May 15 10:40:00.648030 systemd-networkd[1025]: cali33bdef1d092: Gained IPv6LL May 15 10:40:00.654771 kubelet[1928]: E0515 10:40:00.654739 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:00.655054 kubelet[1928]: E0515 10:40:00.654953 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:00.847742 kubelet[1928]: I0515 10:40:00.847534 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-79585c5f5c-9g8v9" podStartSLOduration=36.254696689 podStartE2EDuration="39.847509919s" podCreationTimestamp="2025-05-15 10:39:21 +0000 UTC" firstStartedPulling="2025-05-15 10:39:56.742409682 +0000 UTC m=+49.610095987" lastFinishedPulling="2025-05-15 10:40:00.335222922 +0000 UTC m=+53.202909217" observedRunningTime="2025-05-15 10:40:00.84698035 +0000 UTC m=+53.714666645" watchObservedRunningTime="2025-05-15 10:40:00.847509919 +0000 UTC m=+53.715196214" May 15 10:40:00.869915 kubelet[1928]: I0515 10:40:00.869852 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-h27s2" podStartSLOduration=48.869809672 podStartE2EDuration="48.869809672s" podCreationTimestamp="2025-05-15 10:39:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2025-05-15 10:40:00.859317418 +0000 UTC m=+53.727003743" watchObservedRunningTime="2025-05-15 10:40:00.869809672 +0000 UTC m=+53.737495977" May 15 10:40:00.868000 audit[4202]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:00.868000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffca63264a0 a2=0 a3=7ffca632648c items=0 ppid=2074 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.868000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:00.881000 audit[4202]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:00.881000 audit[4202]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffca63264a0 a2=0 a3=7ffca632648c items=0 ppid=2074 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:00.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:01.320649 systemd[1]: run-netns-cni\x2d90c0c865\x2d8c72\x2d7473\x2dd202\x2dfd74fab46438.mount: Deactivated successfully. May 15 10:40:01.544073 systemd-networkd[1025]: cali147ce168ecf: Gained IPv6LL May 15 10:40:01.656974 kubelet[1928]: E0515 10:40:01.656871 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:01.657333 kubelet[1928]: E0515 10:40:01.657079 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:02.135593 systemd[1]: Started sshd@10-10.0.0.55:22-10.0.0.1:43514.service. May 15 10:40:02.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.55:22-10.0.0.1:43514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.136905 kernel: kauditd_printk_skb: 490 callbacks suppressed May 15 10:40:02.136962 kernel: audit: type=1130 audit(1747305602.133:1303): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.55:22-10.0.0.1:43514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.168000 audit[4211]: USER_ACCT pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.170382 sshd[4211]: Accepted publickey for core from 10.0.0.1 port 43514 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:02.172333 sshd[4211]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:02.170000 audit[4211]: CRED_ACQ pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.175459 systemd-logind[1187]: New session 11 of user core. May 15 10:40:02.176484 systemd[1]: Started session-11.scope. May 15 10:40:02.178145 kernel: audit: type=1101 audit(1747305602.168:1304): pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.178202 kernel: audit: type=1103 audit(1747305602.170:1305): pid=4211 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.178231 kernel: audit: type=1006 audit(1747305602.170:1306): pid=4211 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 May 15 10:40:02.170000 audit[4211]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeda6422a0 a2=3 a3=0 items=0 ppid=1 pid=4211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.184208 systemd-networkd[1025]: cali8017327f12e: Gained IPv6LL May 15 10:40:02.184722 kernel: audit: type=1300 audit(1747305602.170:1306): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeda6422a0 a2=3 a3=0 items=0 ppid=1 pid=4211 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.184764 kernel: audit: type=1327 audit(1747305602.170:1306): proctitle=737368643A20636F7265205B707269765D May 15 10:40:02.184816 kernel: audit: type=1105 audit(1747305602.179:1307): pid=4211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.184844 kernel: audit: type=1103 audit(1747305602.180:1308): pid=4213 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:02.179000 audit[4211]: USER_START pid=4211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.180000 audit[4213]: CRED_ACQ pid=4213 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.302752 sshd[4211]: pam_unix(sshd:session): session closed for user core May 15 10:40:02.301000 audit[4211]: USER_END pid=4211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.305684 systemd[1]: sshd@10-10.0.0.55:22-10.0.0.1:43514.service: Deactivated successfully. May 15 10:40:02.306259 systemd[1]: session-11.scope: Deactivated successfully. May 15 10:40:02.306837 systemd-logind[1187]: Session 11 logged out. Waiting for processes to exit. May 15 10:40:02.311424 kernel: audit: type=1106 audit(1747305602.301:1309): pid=4211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.311484 kernel: audit: type=1104 audit(1747305602.301:1310): pid=4211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.301000 audit[4211]: CRED_DISP pid=4211 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.304000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.55:22-10.0.0.1:43514 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.55:22-10.0.0.1:43522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.308163 systemd[1]: Started sshd@11-10.0.0.55:22-10.0.0.1:43522.service. May 15 10:40:02.309165 systemd-logind[1187]: Removed session 11. May 15 10:40:02.337000 audit[4225]: USER_ACCT pid=4225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.339030 sshd[4225]: Accepted publickey for core from 10.0.0.1 port 43522 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:02.337000 audit[4225]: CRED_ACQ pid=4225 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.337000 audit[4225]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff40563700 a2=3 a3=0 items=0 ppid=1 pid=4225 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.337000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:02.339997 sshd[4225]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:02.343182 systemd-logind[1187]: New session 12 of user core. May 15 10:40:02.343971 systemd[1]: Started session-12.scope. May 15 10:40:02.345000 audit[4225]: USER_START pid=4225 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.346000 audit[4228]: CRED_ACQ pid=4228 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.482999 sshd[4225]: pam_unix(sshd:session): session closed for user core May 15 10:40:02.486847 systemd[1]: Started sshd@12-10.0.0.55:22-10.0.0.1:43528.service. May 15 10:40:02.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.55:22-10.0.0.1:43528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.486000 audit[4225]: USER_END pid=4225 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.487000 audit[4225]: CRED_DISP pid=4225 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.490693 systemd[1]: sshd@11-10.0.0.55:22-10.0.0.1:43522.service: Deactivated successfully. May 15 10:40:02.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.55:22-10.0.0.1:43522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.491304 systemd[1]: session-12.scope: Deactivated successfully. May 15 10:40:02.492542 systemd-logind[1187]: Session 12 logged out. Waiting for processes to exit. May 15 10:40:02.494717 systemd-logind[1187]: Removed session 12. May 15 10:40:02.521000 audit[4237]: USER_ACCT pid=4237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.523386 sshd[4237]: Accepted publickey for core from 10.0.0.1 port 43528 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:02.522000 audit[4237]: CRED_ACQ pid=4237 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.522000 audit[4237]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc36848650 a2=3 a3=0 items=0 ppid=1 pid=4237 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:02.522000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:02.524455 sshd[4237]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:02.527677 systemd-logind[1187]: New session 13 of user core. May 15 10:40:02.528497 systemd[1]: Started session-13.scope. May 15 10:40:02.530000 audit[4237]: USER_START pid=4237 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.531000 audit[4240]: CRED_ACQ pid=4240 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.654998 sshd[4237]: pam_unix(sshd:session): session closed for user core May 15 10:40:02.654000 audit[4237]: USER_END pid=4237 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.654000 audit[4237]: CRED_DISP pid=4237 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:02.658565 systemd[1]: sshd@12-10.0.0.55:22-10.0.0.1:43528.service: Deactivated successfully. May 15 10:40:02.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.55:22-10.0.0.1:43528 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:02.659346 systemd[1]: session-13.scope: Deactivated successfully. May 15 10:40:02.660374 systemd-logind[1187]: Session 13 logged out. Waiting for processes to exit. May 15 10:40:02.661377 systemd-logind[1187]: Removed session 13. May 15 10:40:02.663299 kubelet[1928]: E0515 10:40:02.663272 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:03.218000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:03.218000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:03.218000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002884b40 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:40:03.218000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:03.218000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ce8380 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:40:03.218000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:03.394210 systemd[1]: run-containerd-runc-k8s.io-f1f25212b50bd8d67e01e5580e62bb36424448eedd3051d0e6ba532f0e05335f-runc.D9EEon.mount: Deactivated successfully. May 15 10:40:03.437678 kubelet[1928]: E0515 10:40:03.437646 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:04.137695 env[1199]: time="2025-05-15T10:40:04.137636313Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:04.139477 env[1199]: time="2025-05-15T10:40:04.139433839Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:04.140960 env[1199]: time="2025-05-15T10:40:04.140922315Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:04.142330 env[1199]: time="2025-05-15T10:40:04.142299626Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:04.142755 env[1199]: time="2025-05-15T10:40:04.142727936Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:40:04.143683 env[1199]: time="2025-05-15T10:40:04.143661327Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\"" May 15 10:40:04.144606 env[1199]: time="2025-05-15T10:40:04.144569497Z" level=info msg="CreateContainer within sandbox \"8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:40:04.158618 env[1199]: time="2025-05-15T10:40:04.158568893Z" level=info msg="CreateContainer within sandbox \"8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"5bf85e6919b58f4fbc628ae27f88664f7776a287970ecf762197d93c1a857477\"" May 15 10:40:04.159056 env[1199]: time="2025-05-15T10:40:04.159031280Z" level=info msg="StartContainer for \"5bf85e6919b58f4fbc628ae27f88664f7776a287970ecf762197d93c1a857477\"" May 15 10:40:04.172495 systemd[1]: Started cri-containerd-5bf85e6919b58f4fbc628ae27f88664f7776a287970ecf762197d93c1a857477.scope. May 15 10:40:04.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.184000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit: BPF prog-id=194 op=LOAD May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3696 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663835653639313962353866346662633632386165323766383836 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3696 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663835653639313962353866346662633632386165323766383836 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit: BPF prog-id=195 op=LOAD May 15 10:40:04.185000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000318ea0 items=0 ppid=3696 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663835653639313962353866346662633632386165323766383836 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.185000 audit: BPF prog-id=196 op=LOAD May 15 10:40:04.185000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000318ee8 items=0 ppid=3696 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.185000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663835653639313962353866346662633632386165323766383836 May 15 10:40:04.186000 audit: BPF prog-id=196 op=UNLOAD May 15 10:40:04.186000 audit: BPF prog-id=195 op=UNLOAD May 15 10:40:04.186000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { perfmon } for pid=4278 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit[4278]: AVC avc: denied { bpf } for pid=4278 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:04.186000 audit: BPF prog-id=197 op=LOAD May 15 10:40:04.186000 audit[4278]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003192f8 items=0 ppid=3696 pid=4278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.186000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3562663835653639313962353866346662633632386165323766383836 May 15 10:40:04.216990 env[1199]: time="2025-05-15T10:40:04.216907848Z" level=info msg="StartContainer for \"5bf85e6919b58f4fbc628ae27f88664f7776a287970ecf762197d93c1a857477\" returns successfully" May 15 10:40:04.225000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=7287 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:04.225000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:04.225000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00d39a000 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:40:04.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:04.225000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=7293 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:04.225000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c00d54bc80 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:40:04.225000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00e8ac460 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:40:04.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:04.225000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:04.236000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:04.236000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00d54bcb0 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:40:04.236000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:04.244000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=7291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:04.244000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00d03a870 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:40:04.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:04.244000 audit[1807]: AVC avc: denied { watch } for pid=1807 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:04.244000 audit[1807]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00e990fc0 a2=fc6 a3=0 items=0 ppid=1669 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c466,c947 key=(null) May 15 10:40:04.244000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3535002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E May 15 10:40:04.678661 kubelet[1928]: I0515 10:40:04.678605 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d59ff67f4-rqv6w" podStartSLOduration=38.059887779 podStartE2EDuration="43.678581329s" podCreationTimestamp="2025-05-15 10:39:21 +0000 UTC" firstStartedPulling="2025-05-15 10:39:58.524791886 +0000 UTC m=+51.392478191" lastFinishedPulling="2025-05-15 10:40:04.143485436 +0000 UTC m=+57.011171741" observedRunningTime="2025-05-15 10:40:04.677901601 +0000 UTC m=+57.545587906" watchObservedRunningTime="2025-05-15 10:40:04.678581329 +0000 UTC m=+57.546267664" May 15 10:40:04.691000 audit[4311]: NETFILTER_CFG table=filter:117 family=2 entries=10 op=nft_register_rule pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:04.691000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffd712e2e20 a2=0 a3=7ffd712e2e0c items=0 ppid=2074 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.691000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:04.697000 audit[4311]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4311 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:04.697000 audit[4311]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd712e2e20 a2=0 a3=7ffd712e2e0c items=0 ppid=2074 pid=4311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:04.697000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:04.903000 audit[4289]: AVC avc: denied { watch } for pid=4289 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_39_43.1695887728/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c740,c771 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c740,c771 tclass=file permissive=0 May 15 10:40:04.903000 audit[4289]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000d218e0 a2=fc6 a3=0 items=0 ppid=3696 pid=4289 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c740,c771 key=(null) May 15 10:40:04.903000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:40:05.670467 kubelet[1928]: I0515 10:40:05.670436 1928 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:40:06.403897 env[1199]: time="2025-05-15T10:40:06.403754773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:06.405741 env[1199]: time="2025-05-15T10:40:06.405699903Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:06.407217 env[1199]: time="2025-05-15T10:40:06.407177857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:06.408787 env[1199]: time="2025-05-15T10:40:06.408746135Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:72455a36febc7c56ec8881007f4805caed5764026a0694e4f86a2503209b2d31,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:06.409368 env[1199]: time="2025-05-15T10:40:06.409339405Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.3\" returns image reference \"sha256:4c37db5645f4075f8b8170eea8f14e340cb13550e0a392962f1f211ded741505\"" May 15 10:40:06.410560 env[1199]: time="2025-05-15T10:40:06.410531243Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\"" May 15 10:40:06.411959 env[1199]: time="2025-05-15T10:40:06.411920586Z" level=info msg="CreateContainer within sandbox \"48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" May 15 10:40:06.428140 env[1199]: time="2025-05-15T10:40:06.428092691Z" level=info msg="CreateContainer within sandbox \"48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"5fe314907cf80ca9e4d30a206fa5c1c5b11d1b88cb45444c66225af266d5c745\"" May 15 10:40:06.428666 env[1199]: time="2025-05-15T10:40:06.428644980Z" level=info msg="StartContainer for \"5fe314907cf80ca9e4d30a206fa5c1c5b11d1b88cb45444c66225af266d5c745\"" May 15 10:40:06.449026 systemd[1]: Started cri-containerd-5fe314907cf80ca9e4d30a206fa5c1c5b11d1b88cb45444c66225af266d5c745.scope. May 15 10:40:06.460000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f4b888e4878 items=0 ppid=3750 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:06.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566653331343930376366383063613965346433306132303666613563 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.460000 audit: BPF prog-id=198 op=LOAD May 15 10:40:06.460000 audit[4329]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000368428 items=0 ppid=3750 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:06.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566653331343930376366383063613965346433306132303666613563 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit: BPF prog-id=199 op=LOAD May 15 10:40:06.461000 audit[4329]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000368478 items=0 ppid=3750 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:06.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566653331343930376366383063613965346433306132303666613563 May 15 10:40:06.461000 audit: BPF prog-id=199 op=UNLOAD May 15 10:40:06.461000 audit: BPF prog-id=198 op=UNLOAD May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { perfmon } for pid=4329 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit[4329]: AVC avc: denied { bpf } for pid=4329 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:06.461000 audit: BPF prog-id=200 op=LOAD May 15 10:40:06.461000 audit[4329]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000368508 items=0 ppid=3750 pid=4329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:06.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566653331343930376366383063613965346433306132303666613563 May 15 10:40:06.474527 env[1199]: time="2025-05-15T10:40:06.474482756Z" level=info msg="StartContainer for \"5fe314907cf80ca9e4d30a206fa5c1c5b11d1b88cb45444c66225af266d5c745\" returns successfully" May 15 10:40:06.973935 env[1199]: time="2025-05-15T10:40:06.973865783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:07.046826 env[1199]: time="2025-05-15T10:40:07.046765274Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:07.110671 env[1199]: time="2025-05-15T10:40:07.110630113Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:07.139260 env[1199]: time="2025-05-15T10:40:07.139208196Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:bcb659f25f9aebaa389ed1dbb65edb39478ddf82c57d07d8da474e8cab38d77b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:07.139824 env[1199]: time="2025-05-15T10:40:07.139755958Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.3\" returns image reference \"sha256:b1960e792987d99ee8f3583d7354dcd25a683cf854e8f10322ca7eeb83128532\"" May 15 10:40:07.140885 env[1199]: time="2025-05-15T10:40:07.140852491Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\"" May 15 10:40:07.142582 env[1199]: time="2025-05-15T10:40:07.142546373Z" level=info msg="CreateContainer within sandbox \"68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" May 15 10:40:07.158196 env[1199]: time="2025-05-15T10:40:07.158139023Z" level=info msg="CreateContainer within sandbox \"68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"9f63c7677702573c1aa2bcc271491a5313698b83746b394aaa3e24b0096dde15\"" May 15 10:40:07.158604 env[1199]: time="2025-05-15T10:40:07.158569447Z" level=info msg="StartContainer for \"9f63c7677702573c1aa2bcc271491a5313698b83746b394aaa3e24b0096dde15\"" May 15 10:40:07.170908 systemd[1]: Started cri-containerd-9f63c7677702573c1aa2bcc271491a5313698b83746b394aaa3e24b0096dde15.scope. May 15 10:40:07.185469 kernel: kauditd_printk_skb: 156 callbacks suppressed May 15 10:40:07.185660 kernel: audit: type=1400 audit(1747305607.183:1365): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195823 kernel: audit: type=1400 audit(1747305607.183:1366): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195875 kernel: audit: type=1400 audit(1747305607.183:1367): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.195902 kernel: audit: type=1400 audit(1747305607.183:1368): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200836 kernel: audit: type=1400 audit(1747305607.183:1369): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200876 kernel: audit: type=1400 audit(1747305607.183:1370): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.207035 kernel: audit: type=1400 audit(1747305607.183:1371): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.210096 kernel: audit: type=1400 audit(1747305607.183:1372): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.210168 kernel: audit: type=1400 audit(1747305607.183:1373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.187000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.216264 kernel: audit: type=1400 audit(1747305607.187:1374): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.187000 audit: BPF prog-id=201 op=LOAD May 15 10:40:07.187000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.187000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4143 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363363373637373730323537336331616132626363323731343931 May 15 10:40:07.187000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.187000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4143 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363363373637373730323537336331616132626363323731343931 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.188000 audit: BPF prog-id=202 op=LOAD May 15 10:40:07.188000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000323960 items=0 ppid=4143 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.188000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363363373637373730323537336331616132626363323731343931 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.194000 audit: BPF prog-id=203 op=LOAD May 15 10:40:07.194000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003239a8 items=0 ppid=4143 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363363373637373730323537336331616132626363323731343931 May 15 10:40:07.200000 audit: BPF prog-id=203 op=UNLOAD May 15 10:40:07.200000 audit: BPF prog-id=202 op=UNLOAD May 15 10:40:07.200000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { perfmon } for pid=4363 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit[4363]: AVC avc: denied { bpf } for pid=4363 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:07.200000 audit: BPF prog-id=204 op=LOAD May 15 10:40:07.200000 audit[4363]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000323db8 items=0 ppid=4143 pid=4363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3966363363373637373730323537336331616132626363323731343931 May 15 10:40:07.230459 env[1199]: time="2025-05-15T10:40:07.217850309Z" level=info msg="StopPodSandbox for \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\"" May 15 10:40:07.244411 env[1199]: time="2025-05-15T10:40:07.244360686Z" level=info msg="StartContainer for \"9f63c7677702573c1aa2bcc271491a5313698b83746b394aaa3e24b0096dde15\" returns successfully" May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.266 [WARNING][4393] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0", GenerateName:"calico-kube-controllers-79585c5f5c-", Namespace:"calico-system", SelfLink:"", UID:"8c0e0e6f-cec1-4204-bbc8-838b712558a7", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79585c5f5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332", Pod:"calico-kube-controllers-79585c5f5c-9g8v9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1fd5c9d0d82", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.266 [INFO][4393] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.266 [INFO][4393] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" iface="eth0" netns="" May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.266 [INFO][4393] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.266 [INFO][4393] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.289 [INFO][4414] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.289 [INFO][4414] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.289 [INFO][4414] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.295 [WARNING][4414] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.295 [INFO][4414] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.296 [INFO][4414] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:07.299345 env[1199]: 2025-05-15 10:40:07.297 [INFO][4393] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:40:07.299922 env[1199]: time="2025-05-15T10:40:07.299373070Z" level=info msg="TearDown network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\" successfully" May 15 10:40:07.299922 env[1199]: time="2025-05-15T10:40:07.299411193Z" level=info msg="StopPodSandbox for \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\" returns successfully" May 15 10:40:07.300005 env[1199]: time="2025-05-15T10:40:07.299976398Z" level=info msg="RemovePodSandbox for \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\"" May 15 10:40:07.300045 env[1199]: time="2025-05-15T10:40:07.300008130Z" level=info msg="Forcibly stopping sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\"" May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.327 [WARNING][4440] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0", GenerateName:"calico-kube-controllers-79585c5f5c-", Namespace:"calico-system", SelfLink:"", UID:"8c0e0e6f-cec1-4204-bbc8-838b712558a7", ResourceVersion:"947", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79585c5f5c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"542d074a33aa57049602dc7885cc30ac4cf5dda8819529a699c3a32ce4175332", Pod:"calico-kube-controllers-79585c5f5c-9g8v9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali1fd5c9d0d82", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.328 [INFO][4440] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.328 [INFO][4440] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" iface="eth0" netns="" May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.328 [INFO][4440] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.328 [INFO][4440] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.346 [INFO][4448] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.346 [INFO][4448] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.346 [INFO][4448] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.385 [WARNING][4448] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.385 [INFO][4448] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" HandleID="k8s-pod-network.8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" Workload="localhost-k8s-calico--kube--controllers--79585c5f5c--9g8v9-eth0" May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.387 [INFO][4448] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:07.389676 env[1199]: 2025-05-15 10:40:07.388 [INFO][4440] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c" May 15 10:40:07.390111 env[1199]: time="2025-05-15T10:40:07.389706537Z" level=info msg="TearDown network for sandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\" successfully" May 15 10:40:07.456950 env[1199]: time="2025-05-15T10:40:07.456898571Z" level=info msg="RemovePodSandbox \"8672dd4be308562bbd9213aaf1974e8d7cc5ae76da5d6ec30d4486541a0ca39c\" returns successfully" May 15 10:40:07.457388 env[1199]: time="2025-05-15T10:40:07.457363832Z" level=info msg="StopPodSandbox for \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\"" May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.484 [WARNING][4470] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--868hg-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"d0203667-e96b-4313-a901-2551d21cc694", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d", Pod:"coredns-6f6b679f8f-868hg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0fc0133d9a7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.484 [INFO][4470] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.484 [INFO][4470] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" iface="eth0" netns="" May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.484 [INFO][4470] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.484 [INFO][4470] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.501 [INFO][4478] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.501 [INFO][4478] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.502 [INFO][4478] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.507 [WARNING][4478] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.507 [INFO][4478] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.508 [INFO][4478] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:07.511510 env[1199]: 2025-05-15 10:40:07.510 [INFO][4470] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:40:07.512108 env[1199]: time="2025-05-15T10:40:07.511538212Z" level=info msg="TearDown network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\" successfully" May 15 10:40:07.512108 env[1199]: time="2025-05-15T10:40:07.511570204Z" level=info msg="StopPodSandbox for \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\" returns successfully" May 15 10:40:07.512108 env[1199]: time="2025-05-15T10:40:07.512014104Z" level=info msg="RemovePodSandbox for \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\"" May 15 10:40:07.512108 env[1199]: time="2025-05-15T10:40:07.512038963Z" level=info msg="Forcibly stopping sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\"" May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.562 [WARNING][4501] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--868hg-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"d0203667-e96b-4313-a901-2551d21cc694", ResourceVersion:"915", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"184db60a90aadb9784323451739e8377c4a8e56116b33e0c8b6b08207646e13d", Pod:"coredns-6f6b679f8f-868hg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali0fc0133d9a7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.562 [INFO][4501] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.562 [INFO][4501] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" iface="eth0" netns="" May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.562 [INFO][4501] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.562 [INFO][4501] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.587 [INFO][4509] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.587 [INFO][4509] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.587 [INFO][4509] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.607 [WARNING][4509] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.607 [INFO][4509] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" HandleID="k8s-pod-network.c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" Workload="localhost-k8s-coredns--6f6b679f8f--868hg-eth0" May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.608 [INFO][4509] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:07.611014 env[1199]: 2025-05-15 10:40:07.609 [INFO][4501] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1" May 15 10:40:07.627911 env[1199]: time="2025-05-15T10:40:07.611046239Z" level=info msg="TearDown network for sandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\" successfully" May 15 10:40:07.658989 systemd[1]: Started sshd@13-10.0.0.55:22-10.0.0.1:55436.service. May 15 10:40:07.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.55:22-10.0.0.1:55436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:07.695000 audit[4517]: USER_ACCT pid=4517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.696289 sshd[4517]: Accepted publickey for core from 10.0.0.1 port 55436 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:07.696000 audit[4517]: CRED_ACQ pid=4517 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.696000 audit[4517]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcd9808960 a2=3 a3=0 items=0 ppid=1 pid=4517 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.696000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:07.697534 sshd[4517]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:07.701452 systemd-logind[1187]: New session 14 of user core. May 15 10:40:07.702553 systemd[1]: Started session-14.scope. May 15 10:40:07.703719 env[1199]: time="2025-05-15T10:40:07.703675915Z" level=info msg="RemovePodSandbox \"c474d7ffd51957c4d0ada54114545fc256601626205eafbcfe1744312d0a99a1\" returns successfully" May 15 10:40:07.704274 env[1199]: time="2025-05-15T10:40:07.704158238Z" level=info msg="StopPodSandbox for \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\"" May 15 10:40:07.707000 audit[4517]: USER_START pid=4517 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.709000 audit[4535]: CRED_ACQ pid=4535 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.795635 kubelet[1928]: I0515 10:40:07.793134 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6d59ff67f4-xzd78" podStartSLOduration=40.273046117 podStartE2EDuration="46.793114838s" podCreationTimestamp="2025-05-15 10:39:21 +0000 UTC" firstStartedPulling="2025-05-15 10:40:00.620570808 +0000 UTC m=+53.488257113" lastFinishedPulling="2025-05-15 10:40:07.140639539 +0000 UTC m=+60.008325834" observedRunningTime="2025-05-15 10:40:07.79267724 +0000 UTC m=+60.660363545" watchObservedRunningTime="2025-05-15 10:40:07.793114838 +0000 UTC m=+60.660801143" May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.749 [WARNING][4534] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--h27s2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"511be6b8-cb1d-49b9-97c8-78c9294ffecb", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d", Pod:"coredns-6f6b679f8f-h27s2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali147ce168ecf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.749 [INFO][4534] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.749 [INFO][4534] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" iface="eth0" netns="" May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.750 [INFO][4534] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.750 [INFO][4534] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.774 [INFO][4544] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.774 [INFO][4544] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.775 [INFO][4544] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.793 [WARNING][4544] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.793 [INFO][4544] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.796 [INFO][4544] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:07.799267 env[1199]: 2025-05-15 10:40:07.797 [INFO][4534] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:40:07.799680 env[1199]: time="2025-05-15T10:40:07.799310729Z" level=info msg="TearDown network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\" successfully" May 15 10:40:07.799680 env[1199]: time="2025-05-15T10:40:07.799345316Z" level=info msg="StopPodSandbox for \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\" returns successfully" May 15 10:40:07.799820 env[1199]: time="2025-05-15T10:40:07.799784367Z" level=info msg="RemovePodSandbox for \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\"" May 15 10:40:07.799856 env[1199]: time="2025-05-15T10:40:07.799826358Z" level=info msg="Forcibly stopping sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\"" May 15 10:40:07.832000 audit[4582]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4582 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:07.832000 audit[4582]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffdf0b5a980 a2=0 a3=7ffdf0b5a96c items=0 ppid=2074 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.832000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:07.841000 audit[4582]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4582 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:07.841000 audit[4582]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffdf0b5a980 a2=0 a3=7ffdf0b5a96c items=0 ppid=2074 pid=4582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:07.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.868 [WARNING][4573] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--6f6b679f8f--h27s2-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"511be6b8-cb1d-49b9-97c8-78c9294ffecb", ResourceVersion:"943", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"144a23bf6fede5276d6b1bc0efd0008684695955aae2607f44da0fb1327a303d", Pod:"coredns-6f6b679f8f-h27s2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali147ce168ecf", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.869 [INFO][4573] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.869 [INFO][4573] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" iface="eth0" netns="" May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.869 [INFO][4573] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.869 [INFO][4573] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.896 [INFO][4585] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.896 [INFO][4585] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.896 [INFO][4585] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.903 [WARNING][4585] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.903 [INFO][4585] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" HandleID="k8s-pod-network.a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" Workload="localhost-k8s-coredns--6f6b679f8f--h27s2-eth0" May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.906 [INFO][4585] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:07.911839 env[1199]: 2025-05-15 10:40:07.909 [INFO][4573] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32" May 15 10:40:07.911839 env[1199]: time="2025-05-15T10:40:07.911157326Z" level=info msg="TearDown network for sandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\" successfully" May 15 10:40:07.928554 env[1199]: time="2025-05-15T10:40:07.928488494Z" level=info msg="RemovePodSandbox \"a7359de378c2cfc8016a9131dab275d82558f49da4f7bbf50c99242737e48c32\" returns successfully" May 15 10:40:07.929104 env[1199]: time="2025-05-15T10:40:07.929062906Z" level=info msg="StopPodSandbox for \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\"" May 15 10:40:07.942310 sshd[4517]: pam_unix(sshd:session): session closed for user core May 15 10:40:07.942000 audit[4517]: USER_END pid=4517 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.942000 audit[4517]: CRED_DISP pid=4517 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:07.945582 systemd[1]: sshd@13-10.0.0.55:22-10.0.0.1:55436.service: Deactivated successfully. May 15 10:40:07.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.55:22-10.0.0.1:55436 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:07.946156 systemd-logind[1187]: Session 14 logged out. Waiting for processes to exit. May 15 10:40:07.946495 systemd[1]: session-14.scope: Deactivated successfully. May 15 10:40:07.947499 systemd-logind[1187]: Removed session 14. May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:07.970 [WARNING][4608] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9psfb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7e870772-eaea-4b50-ab85-65106d357121", ResourceVersion:"892", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c", Pod:"csi-node-driver-9psfb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali33bdef1d092", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:07.970 [INFO][4608] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:07.970 [INFO][4608] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" iface="eth0" netns="" May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:07.970 [INFO][4608] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:07.970 [INFO][4608] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:07.994 [INFO][4618] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:07.995 [INFO][4618] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:07.995 [INFO][4618] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:08.000 [WARNING][4618] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:08.000 [INFO][4618] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:08.001 [INFO][4618] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:08.005653 env[1199]: 2025-05-15 10:40:08.004 [INFO][4608] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:40:08.006110 env[1199]: time="2025-05-15T10:40:08.005690653Z" level=info msg="TearDown network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\" successfully" May 15 10:40:08.006110 env[1199]: time="2025-05-15T10:40:08.005722365Z" level=info msg="StopPodSandbox for \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\" returns successfully" May 15 10:40:08.006356 env[1199]: time="2025-05-15T10:40:08.006307087Z" level=info msg="RemovePodSandbox for \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\"" May 15 10:40:08.006401 env[1199]: time="2025-05-15T10:40:08.006356974Z" level=info msg="Forcibly stopping sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\"" May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.039 [WARNING][4639] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--9psfb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"7e870772-eaea-4b50-ab85-65106d357121", ResourceVersion:"892", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"5bcd8f69", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c", Pod:"csi-node-driver-9psfb", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali33bdef1d092", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.039 [INFO][4639] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.039 [INFO][4639] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" iface="eth0" netns="" May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.039 [INFO][4639] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.039 [INFO][4639] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.072 [INFO][4647] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.072 [INFO][4647] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.072 [INFO][4647] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.078 [WARNING][4647] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.078 [INFO][4647] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" HandleID="k8s-pod-network.50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" Workload="localhost-k8s-csi--node--driver--9psfb-eth0" May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.080 [INFO][4647] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:08.083657 env[1199]: 2025-05-15 10:40:08.082 [INFO][4639] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e" May 15 10:40:08.083657 env[1199]: time="2025-05-15T10:40:08.083612991Z" level=info msg="TearDown network for sandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\" successfully" May 15 10:40:08.087010 env[1199]: time="2025-05-15T10:40:08.086983768Z" level=info msg="RemovePodSandbox \"50489e33c21a6b93a9783da01c758a33a83226e8caf02ec941a605b358923c2e\" returns successfully" May 15 10:40:08.087540 env[1199]: time="2025-05-15T10:40:08.087488786Z" level=info msg="StopPodSandbox for \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\"" May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.122 [WARNING][4670] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0", GenerateName:"calico-apiserver-6d59ff67f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2d5227-eb07-415c-8504-c8ed4ba92582", ResourceVersion:"1009", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d59ff67f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1", Pod:"calico-apiserver-6d59ff67f4-xzd78", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8017327f12e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.122 [INFO][4670] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.122 [INFO][4670] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" iface="eth0" netns="" May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.122 [INFO][4670] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.122 [INFO][4670] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.141 [INFO][4678] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.141 [INFO][4678] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.141 [INFO][4678] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.146 [WARNING][4678] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.146 [INFO][4678] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.147 [INFO][4678] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:08.150170 env[1199]: 2025-05-15 10:40:08.148 [INFO][4670] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:08.150704 env[1199]: time="2025-05-15T10:40:08.150658359Z" level=info msg="TearDown network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\" successfully" May 15 10:40:08.150704 env[1199]: time="2025-05-15T10:40:08.150695881Z" level=info msg="StopPodSandbox for \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\" returns successfully" May 15 10:40:08.151200 env[1199]: time="2025-05-15T10:40:08.151180900Z" level=info msg="RemovePodSandbox for \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\"" May 15 10:40:08.151245 env[1199]: time="2025-05-15T10:40:08.151206971Z" level=info msg="Forcibly stopping sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\"" May 15 10:40:08.221000 audit[4373]: AVC avc: denied { watch } for pid=4373 comm="apiserver" path="/calico-apiserver-certs/..2025_05_15_10_39_43.820897614/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c248,c374 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c248,c374 tclass=file permissive=0 May 15 10:40:08.221000 audit[4373]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000c702c0 a2=fc6 a3=0 items=0 ppid=4143 pid=4373 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c248,c374 key=(null) May 15 10:40:08.221000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.188 [WARNING][4700] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0", GenerateName:"calico-apiserver-6d59ff67f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"fe2d5227-eb07-415c-8504-c8ed4ba92582", ResourceVersion:"1009", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d59ff67f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"68bab0d81202a4646717a0404ef4e70660920432093d68b671f23fd268f0e2d1", Pod:"calico-apiserver-6d59ff67f4-xzd78", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali8017327f12e", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.188 [INFO][4700] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.188 [INFO][4700] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" iface="eth0" netns="" May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.188 [INFO][4700] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.188 [INFO][4700] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.212 [INFO][4708] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.212 [INFO][4708] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.212 [INFO][4708] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.219 [WARNING][4708] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.219 [INFO][4708] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" HandleID="k8s-pod-network.1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--xzd78-eth0" May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.221 [INFO][4708] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:08.224133 env[1199]: 2025-05-15 10:40:08.223 [INFO][4700] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9" May 15 10:40:08.224503 env[1199]: time="2025-05-15T10:40:08.224171910Z" level=info msg="TearDown network for sandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\" successfully" May 15 10:40:08.227756 env[1199]: time="2025-05-15T10:40:08.227704940Z" level=info msg="RemovePodSandbox \"1dbf4780000473c25b23d47b098820b430ff97d07d0228bda6131e516371e6d9\" returns successfully" May 15 10:40:08.228144 env[1199]: time="2025-05-15T10:40:08.228117229Z" level=info msg="StopPodSandbox for \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\"" May 15 10:40:08.257000 audit[4740]: NETFILTER_CFG table=filter:121 family=2 entries=9 op=nft_register_rule pid=4740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:08.257000 audit[4740]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffd5d44cff0 a2=0 a3=7ffd5d44cfdc items=0 ppid=2074 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.257000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:08.262000 audit[4740]: NETFILTER_CFG table=nat:122 family=2 entries=27 op=nft_register_chain pid=4740 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:08.262000 audit[4740]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffd5d44cff0 a2=0 a3=7ffd5d44cfdc items=0 ppid=2074 pid=4740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:08.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.269 [WARNING][4731] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0", GenerateName:"calico-apiserver-6d59ff67f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"1142278d-8b06-4184-812a-ca4a647a625e", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d59ff67f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb", Pod:"calico-apiserver-6d59ff67f4-rqv6w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2bd7a8e932f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.270 [INFO][4731] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.270 [INFO][4731] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" iface="eth0" netns="" May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.270 [INFO][4731] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.270 [INFO][4731] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.289 [INFO][4743] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.289 [INFO][4743] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.289 [INFO][4743] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.296 [WARNING][4743] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.296 [INFO][4743] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.297 [INFO][4743] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:08.300146 env[1199]: 2025-05-15 10:40:08.298 [INFO][4731] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:40:08.300598 env[1199]: time="2025-05-15T10:40:08.300186704Z" level=info msg="TearDown network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\" successfully" May 15 10:40:08.300598 env[1199]: time="2025-05-15T10:40:08.300222904Z" level=info msg="StopPodSandbox for \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\" returns successfully" May 15 10:40:08.300712 env[1199]: time="2025-05-15T10:40:08.300681021Z" level=info msg="RemovePodSandbox for \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\"" May 15 10:40:08.300762 env[1199]: time="2025-05-15T10:40:08.300712913Z" level=info msg="Forcibly stopping sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\"" May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.330 [WARNING][4765] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0", GenerateName:"calico-apiserver-6d59ff67f4-", Namespace:"calico-apiserver", SelfLink:"", UID:"1142278d-8b06-4184-812a-ca4a647a625e", ResourceVersion:"991", Generation:0, CreationTimestamp:time.Date(2025, time.May, 15, 10, 39, 21, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6d59ff67f4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"8bdb2f0fb8a23b432a9718330fd1eb7b89746dc4d17c40bab0f4ba390da1b2fb", Pod:"calico-apiserver-6d59ff67f4-rqv6w", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2bd7a8e932f", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.331 [INFO][4765] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.331 [INFO][4765] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" iface="eth0" netns="" May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.331 [INFO][4765] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.331 [INFO][4765] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.349 [INFO][4774] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.349 [INFO][4774] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.349 [INFO][4774] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.355 [WARNING][4774] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.355 [INFO][4774] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" HandleID="k8s-pod-network.93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" Workload="localhost-k8s-calico--apiserver--6d59ff67f4--rqv6w-eth0" May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.356 [INFO][4774] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. May 15 10:40:08.359357 env[1199]: 2025-05-15 10:40:08.357 [INFO][4765] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0" May 15 10:40:08.359881 env[1199]: time="2025-05-15T10:40:08.359347153Z" level=info msg="TearDown network for sandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\" successfully" May 15 10:40:08.374127 env[1199]: time="2025-05-15T10:40:08.374104669Z" level=info msg="RemovePodSandbox \"93785a46eb41eec5a7a78ecba58d12cf67e7ef595de0287b0f78aea34c414ef0\" returns successfully" May 15 10:40:09.323503 env[1199]: time="2025-05-15T10:40:09.323450933Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:09.332935 env[1199]: time="2025-05-15T10:40:09.332875887Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:09.354724 env[1199]: time="2025-05-15T10:40:09.354688128Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:09.356320 env[1199]: time="2025-05-15T10:40:09.356296741Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:3f15090a9bb45773d1fd019455ec3d3f3746f3287c35d8013e497b38d8237324,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" May 15 10:40:09.356716 env[1199]: time="2025-05-15T10:40:09.356695302Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.3\" returns image reference \"sha256:e909e2ccf54404290b577fbddd190d036984deed184001767f820b0dddf77fd9\"" May 15 10:40:09.359743 env[1199]: time="2025-05-15T10:40:09.359705489Z" level=info msg="CreateContainer within sandbox \"48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" May 15 10:40:09.371919 env[1199]: time="2025-05-15T10:40:09.371790743Z" level=info msg="CreateContainer within sandbox \"48edd434341c809aac9ebfd94059ec8b2aa9bd62189a688402ddeba5be93d85c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"81add34744b34601923f1b147a4741b69c110bd8db1081d87b24407dfa49c7e9\"" May 15 10:40:09.372360 env[1199]: time="2025-05-15T10:40:09.372328744Z" level=info msg="StartContainer for \"81add34744b34601923f1b147a4741b69c110bd8db1081d87b24407dfa49c7e9\"" May 15 10:40:09.389865 systemd[1]: Started cri-containerd-81add34744b34601923f1b147a4741b69c110bd8db1081d87b24407dfa49c7e9.scope. May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f578c13acb8 items=0 ppid=3750 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831616464333437343462333436303139323366316231343761343734 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit: BPF prog-id=205 op=LOAD May 15 10:40:09.400000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00038edc8 items=0 ppid=3750 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831616464333437343462333436303139323366316231343761343734 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit: BPF prog-id=206 op=LOAD May 15 10:40:09.400000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00038ee18 items=0 ppid=3750 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831616464333437343462333436303139323366316231343761343734 May 15 10:40:09.400000 audit: BPF prog-id=206 op=UNLOAD May 15 10:40:09.400000 audit: BPF prog-id=205 op=UNLOAD May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { perfmon } for pid=4788 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit[4788]: AVC avc: denied { bpf } for pid=4788 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 May 15 10:40:09.400000 audit: BPF prog-id=207 op=LOAD May 15 10:40:09.400000 audit[4788]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00038eea8 items=0 ppid=3750 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:09.400000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831616464333437343462333436303139323366316231343761343734 May 15 10:40:09.412560 env[1199]: time="2025-05-15T10:40:09.412493519Z" level=info msg="StartContainer for \"81add34744b34601923f1b147a4741b69c110bd8db1081d87b24407dfa49c7e9\" returns successfully" May 15 10:40:09.709352 kubelet[1928]: I0515 10:40:09.709196 1928 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-9psfb" podStartSLOduration=38.055853604 podStartE2EDuration="48.709180262s" podCreationTimestamp="2025-05-15 10:39:21 +0000 UTC" firstStartedPulling="2025-05-15 10:39:58.704159526 +0000 UTC m=+51.571845831" lastFinishedPulling="2025-05-15 10:40:09.357486184 +0000 UTC m=+62.225172489" observedRunningTime="2025-05-15 10:40:09.708547798 +0000 UTC m=+62.576234113" watchObservedRunningTime="2025-05-15 10:40:09.709180262 +0000 UTC m=+62.576866567" May 15 10:40:10.310850 kubelet[1928]: I0515 10:40:10.310785 1928 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 May 15 10:40:10.310850 kubelet[1928]: I0515 10:40:10.310845 1928 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock May 15 10:40:10.975000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:10.975000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:10.975000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:10.975000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c00141fa00 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:40:10.975000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0009d96a0 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:40:10.975000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:10.975000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:10.975000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ce8bc0 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:40:10.975000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:10.975000 audit[1820]: AVC avc: denied { watch } for pid=1820 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=7285 scontext=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 May 15 10:40:10.975000 audit[1820]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0009d9720 a2=fc6 a3=0 items=0 ppid=1642 pid=1820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c317,c870 key=(null) May 15 10:40:10.975000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 May 15 10:40:12.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.55:22-10.0.0.1:55448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:12.946066 systemd[1]: Started sshd@14-10.0.0.55:22-10.0.0.1:55448.service. May 15 10:40:12.948065 kernel: kauditd_printk_skb: 128 callbacks suppressed May 15 10:40:12.948147 kernel: audit: type=1130 audit(1747305612.945:1407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.55:22-10.0.0.1:55448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:12.980000 audit[4820]: USER_ACCT pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:12.981708 sshd[4820]: Accepted publickey for core from 10.0.0.1 port 55448 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:12.985000 audit[4820]: CRED_ACQ pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:12.986500 sshd[4820]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:12.990457 kernel: audit: type=1101 audit(1747305612.980:1408): pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:12.990509 kernel: audit: type=1103 audit(1747305612.985:1409): pid=4820 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:12.991504 kernel: audit: type=1006 audit(1747305612.985:1410): pid=4820 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 May 15 10:40:12.989821 systemd-logind[1187]: New session 15 of user core. May 15 10:40:12.990782 systemd[1]: Started session-15.scope. May 15 10:40:12.985000 audit[4820]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc428fa00 a2=3 a3=0 items=0 ppid=1 pid=4820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:12.996062 kernel: audit: type=1300 audit(1747305612.985:1410): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc428fa00 a2=3 a3=0 items=0 ppid=1 pid=4820 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:12.996119 kernel: audit: type=1327 audit(1747305612.985:1410): proctitle=737368643A20636F7265205B707269765D May 15 10:40:12.985000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:12.994000 audit[4820]: USER_START pid=4820 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.001550 kernel: audit: type=1105 audit(1747305612.994:1411): pid=4820 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.001589 kernel: audit: type=1103 audit(1747305612.995:1412): pid=4822 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:12.995000 audit[4822]: CRED_ACQ pid=4822 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.128754 sshd[4820]: pam_unix(sshd:session): session closed for user core May 15 10:40:13.128000 audit[4820]: USER_END pid=4820 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.130780 systemd[1]: sshd@14-10.0.0.55:22-10.0.0.1:55448.service: Deactivated successfully. May 15 10:40:13.131484 systemd[1]: session-15.scope: Deactivated successfully. May 15 10:40:13.134311 systemd-logind[1187]: Session 15 logged out. Waiting for processes to exit. May 15 10:40:13.135029 systemd-logind[1187]: Removed session 15. May 15 10:40:13.128000 audit[4820]: CRED_DISP pid=4820 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.139701 kernel: audit: type=1106 audit(1747305613.128:1413): pid=4820 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.139773 kernel: audit: type=1104 audit(1747305613.128:1414): pid=4820 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:13.130000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.55:22-10.0.0.1:55448 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:15.132036 kubelet[1928]: I0515 10:40:15.131882 1928 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" May 15 10:40:15.163000 audit[4861]: NETFILTER_CFG table=filter:123 family=2 entries=8 op=nft_register_rule pid=4861 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.163000 audit[4861]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fff69ad2300 a2=0 a3=7fff69ad22ec items=0 ppid=2074 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.163000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:15.168000 audit[4861]: NETFILTER_CFG table=nat:124 family=2 entries=34 op=nft_register_chain pid=4861 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:15.168000 audit[4861]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7fff69ad2300 a2=0 a3=7fff69ad22ec items=0 ppid=2074 pid=4861 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:15.168000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:18.132998 systemd[1]: Started sshd@15-10.0.0.55:22-10.0.0.1:54960.service. May 15 10:40:18.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.55:22-10.0.0.1:54960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:18.134173 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 10:40:18.134236 kernel: audit: type=1130 audit(1747305618.132:1418): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.55:22-10.0.0.1:54960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:18.165000 audit[4875]: USER_ACCT pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.166751 sshd[4875]: Accepted publickey for core from 10.0.0.1 port 54960 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:18.168327 sshd[4875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:18.171740 systemd-logind[1187]: New session 16 of user core. May 15 10:40:18.172067 systemd[1]: Started session-16.scope. May 15 10:40:18.167000 audit[4875]: CRED_ACQ pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.183391 kernel: audit: type=1101 audit(1747305618.165:1419): pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.183444 kernel: audit: type=1103 audit(1747305618.167:1420): pid=4875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.183470 kernel: audit: type=1006 audit(1747305618.167:1421): pid=4875 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 May 15 10:40:18.167000 audit[4875]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda9a72400 a2=3 a3=0 items=0 ppid=1 pid=4875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:18.189631 kernel: audit: type=1300 audit(1747305618.167:1421): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda9a72400 a2=3 a3=0 items=0 ppid=1 pid=4875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:18.189671 kernel: audit: type=1327 audit(1747305618.167:1421): proctitle=737368643A20636F7265205B707269765D May 15 10:40:18.167000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:18.175000 audit[4875]: USER_START pid=4875 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.195239 kernel: audit: type=1105 audit(1747305618.175:1422): pid=4875 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.195283 kernel: audit: type=1103 audit(1747305618.176:1423): pid=4877 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.176000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.310870 sshd[4875]: pam_unix(sshd:session): session closed for user core May 15 10:40:18.310000 audit[4875]: USER_END pid=4875 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.312788 systemd[1]: sshd@15-10.0.0.55:22-10.0.0.1:54960.service: Deactivated successfully. May 15 10:40:18.313493 systemd[1]: session-16.scope: Deactivated successfully. May 15 10:40:18.314337 systemd-logind[1187]: Session 16 logged out. Waiting for processes to exit. May 15 10:40:18.314980 systemd-logind[1187]: Removed session 16. May 15 10:40:18.311000 audit[4875]: CRED_DISP pid=4875 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.319380 kernel: audit: type=1106 audit(1747305618.310:1424): pid=4875 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.319459 kernel: audit: type=1104 audit(1747305618.311:1425): pid=4875 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:18.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.55:22-10.0.0.1:54960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:21.231348 kubelet[1928]: E0515 10:40:21.231303 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:23.231949 kubelet[1928]: E0515 10:40:23.231901 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:23.315684 systemd[1]: Started sshd@16-10.0.0.55:22-10.0.0.1:54966.service. May 15 10:40:23.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.55:22-10.0.0.1:54966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:23.322120 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:23.322210 kernel: audit: type=1130 audit(1747305623.315:1427): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.55:22-10.0.0.1:54966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:23.349000 audit[4891]: USER_ACCT pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.350839 sshd[4891]: Accepted publickey for core from 10.0.0.1 port 54966 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:23.352260 sshd[4891]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:23.351000 audit[4891]: CRED_ACQ pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.356055 systemd-logind[1187]: New session 17 of user core. May 15 10:40:23.356872 systemd[1]: Started session-17.scope. May 15 10:40:23.359311 kernel: audit: type=1101 audit(1747305623.349:1428): pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.359368 kernel: audit: type=1103 audit(1747305623.351:1429): pid=4891 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.359399 kernel: audit: type=1006 audit(1747305623.351:1430): pid=4891 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 May 15 10:40:23.362228 kernel: audit: type=1300 audit(1747305623.351:1430): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef26a9a00 a2=3 a3=0 items=0 ppid=1 pid=4891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:23.351000 audit[4891]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef26a9a00 a2=3 a3=0 items=0 ppid=1 pid=4891 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:23.366669 kernel: audit: type=1327 audit(1747305623.351:1430): proctitle=737368643A20636F7265205B707269765D May 15 10:40:23.351000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:23.368187 kernel: audit: type=1105 audit(1747305623.360:1431): pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.360000 audit[4891]: USER_START pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.361000 audit[4893]: CRED_ACQ pid=4893 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.376636 kernel: audit: type=1103 audit(1747305623.361:1432): pid=4893 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.496935 sshd[4891]: pam_unix(sshd:session): session closed for user core May 15 10:40:23.497000 audit[4891]: USER_END pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.499187 systemd[1]: sshd@16-10.0.0.55:22-10.0.0.1:54966.service: Deactivated successfully. May 15 10:40:23.499963 systemd[1]: session-17.scope: Deactivated successfully. May 15 10:40:23.500968 systemd-logind[1187]: Session 17 logged out. Waiting for processes to exit. May 15 10:40:23.501651 systemd-logind[1187]: Removed session 17. May 15 10:40:23.497000 audit[4891]: CRED_DISP pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.506534 kernel: audit: type=1106 audit(1747305623.497:1433): pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.506590 kernel: audit: type=1104 audit(1747305623.497:1434): pid=4891 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:23.498000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.55:22-10.0.0.1:54966 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:27.232211 kubelet[1928]: E0515 10:40:27.232159 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:28.501354 systemd[1]: Started sshd@17-10.0.0.55:22-10.0.0.1:47454.service. May 15 10:40:28.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.55:22-10.0.0.1:47454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:28.502392 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:28.502442 kernel: audit: type=1130 audit(1747305628.500:1436): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.55:22-10.0.0.1:47454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:28.531000 audit[4905]: USER_ACCT pid=4905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.532383 sshd[4905]: Accepted publickey for core from 10.0.0.1 port 47454 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:28.534077 sshd[4905]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:28.532000 audit[4905]: CRED_ACQ pid=4905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.537580 systemd-logind[1187]: New session 18 of user core. May 15 10:40:28.538374 systemd[1]: Started session-18.scope. May 15 10:40:28.540039 kernel: audit: type=1101 audit(1747305628.531:1437): pid=4905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.540097 kernel: audit: type=1103 audit(1747305628.532:1438): pid=4905 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.540125 kernel: audit: type=1006 audit(1747305628.532:1439): pid=4905 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 May 15 10:40:28.542197 kernel: audit: type=1300 audit(1747305628.532:1439): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1ad0edb0 a2=3 a3=0 items=0 ppid=1 pid=4905 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:28.532000 audit[4905]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff1ad0edb0 a2=3 a3=0 items=0 ppid=1 pid=4905 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:28.546031 kernel: audit: type=1327 audit(1747305628.532:1439): proctitle=737368643A20636F7265205B707269765D May 15 10:40:28.532000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:28.541000 audit[4905]: USER_START pid=4905 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.551419 kernel: audit: type=1105 audit(1747305628.541:1440): pid=4905 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.551463 kernel: audit: type=1103 audit(1747305628.543:1441): pid=4907 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.543000 audit[4907]: CRED_ACQ pid=4907 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.644774 sshd[4905]: pam_unix(sshd:session): session closed for user core May 15 10:40:28.653817 kernel: audit: type=1106 audit(1747305628.645:1442): pid=4905 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.653880 kernel: audit: type=1104 audit(1747305628.645:1443): pid=4905 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.645000 audit[4905]: USER_END pid=4905 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.645000 audit[4905]: CRED_DISP pid=4905 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.55:22-10.0.0.1:47464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:28.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.55:22-10.0.0.1:47454 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:28.648526 systemd[1]: Started sshd@18-10.0.0.55:22-10.0.0.1:47464.service. May 15 10:40:28.649233 systemd[1]: sshd@17-10.0.0.55:22-10.0.0.1:47454.service: Deactivated successfully. May 15 10:40:28.649787 systemd[1]: session-18.scope: Deactivated successfully. May 15 10:40:28.652055 systemd-logind[1187]: Session 18 logged out. Waiting for processes to exit. May 15 10:40:28.652907 systemd-logind[1187]: Removed session 18. May 15 10:40:28.677000 audit[4917]: USER_ACCT pid=4917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.678813 sshd[4917]: Accepted publickey for core from 10.0.0.1 port 47464 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:28.678000 audit[4917]: CRED_ACQ pid=4917 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.678000 audit[4917]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc775b0d20 a2=3 a3=0 items=0 ppid=1 pid=4917 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:28.678000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:28.679700 sshd[4917]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:28.682764 systemd-logind[1187]: New session 19 of user core. May 15 10:40:28.683527 systemd[1]: Started session-19.scope. May 15 10:40:28.686000 audit[4917]: USER_START pid=4917 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:28.687000 audit[4920]: CRED_ACQ pid=4920 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:29.231931 kubelet[1928]: E0515 10:40:29.231889 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:29.795219 sshd[4917]: pam_unix(sshd:session): session closed for user core May 15 10:40:29.795000 audit[4917]: USER_END pid=4917 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:29.795000 audit[4917]: CRED_DISP pid=4917 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:29.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.55:22-10.0.0.1:47466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:29.799140 systemd[1]: Started sshd@19-10.0.0.55:22-10.0.0.1:47466.service. May 15 10:40:29.800458 systemd[1]: sshd@18-10.0.0.55:22-10.0.0.1:47464.service: Deactivated successfully. May 15 10:40:29.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.55:22-10.0.0.1:47464 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:29.800985 systemd[1]: session-19.scope: Deactivated successfully. May 15 10:40:29.801480 systemd-logind[1187]: Session 19 logged out. Waiting for processes to exit. May 15 10:40:29.802181 systemd-logind[1187]: Removed session 19. May 15 10:40:29.831000 audit[4930]: USER_ACCT pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:29.832033 sshd[4930]: Accepted publickey for core from 10.0.0.1 port 47466 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:29.831000 audit[4930]: CRED_ACQ pid=4930 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:29.831000 audit[4930]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda0928800 a2=3 a3=0 items=0 ppid=1 pid=4930 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:29.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:29.832967 sshd[4930]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:29.836149 systemd-logind[1187]: New session 20 of user core. May 15 10:40:29.836850 systemd[1]: Started session-20.scope. May 15 10:40:29.839000 audit[4930]: USER_START pid=4930 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:29.840000 audit[4933]: CRED_ACQ pid=4933 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.610929 systemd[1]: run-containerd-runc-k8s.io-fbe4cb80c8044667b5d3280aa5c11032087785b961f7222a30d9444f9e2491f6-runc.E5SVNC.mount: Deactivated successfully. May 15 10:40:31.737000 audit[4966]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:31.737000 audit[4966]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffd584c3510 a2=0 a3=7ffd584c34fc items=0 ppid=2074 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:31.742000 audit[4966]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4966 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:31.742000 audit[4966]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffd584c3510 a2=0 a3=0 items=0 ppid=2074 pid=4966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:31.753000 audit[4968]: NETFILTER_CFG table=filter:127 family=2 entries=32 op=nft_register_rule pid=4968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:31.753000 audit[4968]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffc1781bb00 a2=0 a3=7ffc1781baec items=0 ppid=2074 pid=4968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:31.759000 audit[4968]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:31.759000 audit[4968]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffc1781bb00 a2=0 a3=0 items=0 ppid=2074 pid=4968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.759000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:31.788063 sshd[4930]: pam_unix(sshd:session): session closed for user core May 15 10:40:31.788000 audit[4930]: USER_END pid=4930 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.789000 audit[4930]: CRED_DISP pid=4930 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.791753 systemd[1]: Started sshd@20-10.0.0.55:22-10.0.0.1:47478.service. May 15 10:40:31.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.55:22-10.0.0.1:47478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:31.792258 systemd[1]: sshd@19-10.0.0.55:22-10.0.0.1:47466.service: Deactivated successfully. May 15 10:40:31.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.55:22-10.0.0.1:47466 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:31.792790 systemd[1]: session-20.scope: Deactivated successfully. May 15 10:40:31.793320 systemd-logind[1187]: Session 20 logged out. Waiting for processes to exit. May 15 10:40:31.794192 systemd-logind[1187]: Removed session 20. May 15 10:40:31.822000 audit[4970]: USER_ACCT pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.823653 sshd[4970]: Accepted publickey for core from 10.0.0.1 port 47478 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:31.823000 audit[4970]: CRED_ACQ pid=4970 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.823000 audit[4970]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe5b46baa0 a2=3 a3=0 items=0 ppid=1 pid=4970 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:31.823000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:31.824757 sshd[4970]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:31.827780 systemd-logind[1187]: New session 21 of user core. May 15 10:40:31.828536 systemd[1]: Started session-21.scope. May 15 10:40:31.831000 audit[4970]: USER_START pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:31.832000 audit[4973]: CRED_ACQ pid=4973 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.356124 sshd[4970]: pam_unix(sshd:session): session closed for user core May 15 10:40:32.356000 audit[4970]: USER_END pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.356000 audit[4970]: CRED_DISP pid=4970 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.358569 systemd[1]: sshd@20-10.0.0.55:22-10.0.0.1:47478.service: Deactivated successfully. May 15 10:40:32.357000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.55:22-10.0.0.1:47478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:32.359074 systemd[1]: session-21.scope: Deactivated successfully. May 15 10:40:32.359632 systemd-logind[1187]: Session 21 logged out. Waiting for processes to exit. May 15 10:40:32.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.55:22-10.0.0.1:47480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:32.389000 audit[4983]: USER_ACCT pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.390000 audit[4983]: CRED_ACQ pid=4983 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.390000 audit[4983]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0b7ec340 a2=3 a3=0 items=0 ppid=1 pid=4983 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:32.390000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:32.399000 audit[4983]: USER_START pid=4983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.401000 audit[4985]: CRED_ACQ pid=4985 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.391898 sshd[4983]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:32.360627 systemd[1]: Started sshd@21-10.0.0.55:22-10.0.0.1:47480.service. May 15 10:40:32.361340 systemd-logind[1187]: Removed session 21. May 15 10:40:32.440097 sshd[4983]: Accepted publickey for core from 10.0.0.1 port 47480 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:32.395132 systemd-logind[1187]: New session 22 of user core. May 15 10:40:32.395939 systemd[1]: Started session-22.scope. May 15 10:40:32.508446 sshd[4983]: pam_unix(sshd:session): session closed for user core May 15 10:40:32.508000 audit[4983]: USER_END pid=4983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.508000 audit[4983]: CRED_DISP pid=4983 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:32.510577 systemd[1]: sshd@21-10.0.0.55:22-10.0.0.1:47480.service: Deactivated successfully. May 15 10:40:32.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.55:22-10.0.0.1:47480 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:32.511465 systemd[1]: session-22.scope: Deactivated successfully. May 15 10:40:32.512077 systemd-logind[1187]: Session 22 logged out. Waiting for processes to exit. May 15 10:40:32.512742 systemd-logind[1187]: Removed session 22. May 15 10:40:37.512857 systemd[1]: Started sshd@22-10.0.0.55:22-10.0.0.1:53398.service. May 15 10:40:37.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.55:22-10.0.0.1:53398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:37.518669 kernel: kauditd_printk_skb: 57 callbacks suppressed May 15 10:40:37.520128 kernel: audit: type=1130 audit(1747305637.512:1485): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.55:22-10.0.0.1:53398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:37.543000 audit[5025]: USER_ACCT pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.544600 sshd[5025]: Accepted publickey for core from 10.0.0.1 port 53398 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:37.546228 sshd[5025]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:37.588420 kernel: audit: type=1101 audit(1747305637.543:1486): pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.588462 kernel: audit: type=1103 audit(1747305637.543:1487): pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.588482 kernel: audit: type=1006 audit(1747305637.543:1488): pid=5025 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 May 15 10:40:37.588499 kernel: audit: type=1300 audit(1747305637.543:1488): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7a69a750 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:37.588519 kernel: audit: type=1327 audit(1747305637.543:1488): proctitle=737368643A20636F7265205B707269765D May 15 10:40:37.588532 kernel: audit: type=1105 audit(1747305637.551:1489): pid=5025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.588546 kernel: audit: type=1103 audit(1747305637.553:1490): pid=5027 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.543000 audit[5025]: CRED_ACQ pid=5025 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.543000 audit[5025]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff7a69a750 a2=3 a3=0 items=0 ppid=1 pid=5025 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:37.543000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:37.551000 audit[5025]: USER_START pid=5025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.553000 audit[5027]: CRED_ACQ pid=5027 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.549604 systemd-logind[1187]: New session 23 of user core. May 15 10:40:37.550347 systemd[1]: Started session-23.scope. May 15 10:40:37.657240 sshd[5025]: pam_unix(sshd:session): session closed for user core May 15 10:40:37.657000 audit[5025]: USER_END pid=5025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.659569 systemd[1]: sshd@22-10.0.0.55:22-10.0.0.1:53398.service: Deactivated successfully. May 15 10:40:37.660392 systemd[1]: session-23.scope: Deactivated successfully. May 15 10:40:37.660888 systemd-logind[1187]: Session 23 logged out. Waiting for processes to exit. May 15 10:40:37.661502 systemd-logind[1187]: Removed session 23. May 15 10:40:37.657000 audit[5025]: CRED_DISP pid=5025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.667519 kernel: audit: type=1106 audit(1747305637.657:1491): pid=5025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.667567 kernel: audit: type=1104 audit(1747305637.657:1492): pid=5025 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:37.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.55:22-10.0.0.1:53398 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:39.305000 audit[5038]: NETFILTER_CFG table=filter:129 family=2 entries=20 op=nft_register_rule pid=5038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:39.305000 audit[5038]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffd5d4f1c0 a2=0 a3=7fffd5d4f1ac items=0 ppid=2074 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:39.305000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:39.310000 audit[5038]: NETFILTER_CFG table=nat:130 family=2 entries=106 op=nft_register_chain pid=5038 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" May 15 10:40:39.310000 audit[5038]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffd5d4f1c0 a2=0 a3=7fffd5d4f1ac items=0 ppid=2074 pid=5038 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:39.310000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 May 15 10:40:42.661000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.55:22-10.0.0.1:53404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:42.661796 systemd[1]: Started sshd@23-10.0.0.55:22-10.0.0.1:53404.service. May 15 10:40:42.666125 kernel: kauditd_printk_skb: 7 callbacks suppressed May 15 10:40:42.666172 kernel: audit: type=1130 audit(1747305642.661:1496): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.55:22-10.0.0.1:53404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:42.691000 audit[5043]: USER_ACCT pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.692153 sshd[5043]: Accepted publickey for core from 10.0.0.1 port 53404 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:42.694245 sshd[5043]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:42.693000 audit[5043]: CRED_ACQ pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.697450 systemd-logind[1187]: New session 24 of user core. May 15 10:40:42.698120 systemd[1]: Started session-24.scope. May 15 10:40:42.701733 kernel: audit: type=1101 audit(1747305642.691:1497): pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.701857 kernel: audit: type=1103 audit(1747305642.693:1498): pid=5043 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.701885 kernel: audit: type=1006 audit(1747305642.693:1499): pid=5043 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 May 15 10:40:42.693000 audit[5043]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0db52fe0 a2=3 a3=0 items=0 ppid=1 pid=5043 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:42.707916 kernel: audit: type=1300 audit(1747305642.693:1499): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe0db52fe0 a2=3 a3=0 items=0 ppid=1 pid=5043 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:42.708018 kernel: audit: type=1327 audit(1747305642.693:1499): proctitle=737368643A20636F7265205B707269765D May 15 10:40:42.693000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:42.701000 audit[5043]: USER_START pid=5043 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.713423 kernel: audit: type=1105 audit(1747305642.701:1500): pid=5043 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.713461 kernel: audit: type=1103 audit(1747305642.702:1501): pid=5045 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.702000 audit[5045]: CRED_ACQ pid=5045 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.798469 sshd[5043]: pam_unix(sshd:session): session closed for user core May 15 10:40:42.798000 audit[5043]: USER_END pid=5043 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.800457 systemd[1]: sshd@23-10.0.0.55:22-10.0.0.1:53404.service: Deactivated successfully. May 15 10:40:42.801176 systemd[1]: session-24.scope: Deactivated successfully. May 15 10:40:42.801835 systemd-logind[1187]: Session 24 logged out. Waiting for processes to exit. May 15 10:40:42.802555 systemd-logind[1187]: Removed session 24. May 15 10:40:42.798000 audit[5043]: CRED_DISP pid=5043 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.807092 kernel: audit: type=1106 audit(1747305642.798:1502): pid=5043 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.807133 kernel: audit: type=1104 audit(1747305642.798:1503): pid=5043 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:42.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.55:22-10.0.0.1:53404 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:43.335273 systemd[1]: run-containerd-runc-k8s.io-fbe4cb80c8044667b5d3280aa5c11032087785b961f7222a30d9444f9e2491f6-runc.e5hGjn.mount: Deactivated successfully. May 15 10:40:47.802893 systemd[1]: Started sshd@24-10.0.0.55:22-10.0.0.1:48968.service. May 15 10:40:47.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.55:22-10.0.0.1:48968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:47.808283 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:47.808402 kernel: audit: type=1130 audit(1747305647.802:1505): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.55:22-10.0.0.1:48968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:47.834000 audit[5078]: USER_ACCT pid=5078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.835259 sshd[5078]: Accepted publickey for core from 10.0.0.1 port 48968 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:47.837406 sshd[5078]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:47.836000 audit[5078]: CRED_ACQ pid=5078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.840785 systemd-logind[1187]: New session 25 of user core. May 15 10:40:47.841580 systemd[1]: Started session-25.scope. May 15 10:40:47.842906 kernel: audit: type=1101 audit(1747305647.834:1506): pid=5078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.842953 kernel: audit: type=1103 audit(1747305647.836:1507): pid=5078 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.842970 kernel: audit: type=1006 audit(1747305647.836:1508): pid=5078 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 May 15 10:40:47.845239 kernel: audit: type=1300 audit(1747305647.836:1508): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdde0a89f0 a2=3 a3=0 items=0 ppid=1 pid=5078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:47.836000 audit[5078]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdde0a89f0 a2=3 a3=0 items=0 ppid=1 pid=5078 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:47.836000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:47.850941 kernel: audit: type=1327 audit(1747305647.836:1508): proctitle=737368643A20636F7265205B707269765D May 15 10:40:47.850992 kernel: audit: type=1105 audit(1747305647.844:1509): pid=5078 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.844000 audit[5078]: USER_START pid=5078 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.855322 kernel: audit: type=1103 audit(1747305647.845:1510): pid=5080 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.845000 audit[5080]: CRED_ACQ pid=5080 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.963656 sshd[5078]: pam_unix(sshd:session): session closed for user core May 15 10:40:47.963000 audit[5078]: USER_END pid=5078 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.965927 systemd[1]: sshd@24-10.0.0.55:22-10.0.0.1:48968.service: Deactivated successfully. May 15 10:40:47.966770 systemd[1]: session-25.scope: Deactivated successfully. May 15 10:40:47.967401 systemd-logind[1187]: Session 25 logged out. Waiting for processes to exit. May 15 10:40:47.968263 systemd-logind[1187]: Removed session 25. May 15 10:40:47.964000 audit[5078]: CRED_DISP pid=5078 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.972653 kernel: audit: type=1106 audit(1747305647.963:1511): pid=5078 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.972725 kernel: audit: type=1104 audit(1747305647.964:1512): pid=5078 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:47.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.55:22-10.0.0.1:48968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:52.232168 kubelet[1928]: E0515 10:40:52.232107 1928 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" May 15 10:40:52.968525 systemd[1]: Started sshd@25-10.0.0.55:22-10.0.0.1:48972.service. May 15 10:40:52.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.55:22-10.0.0.1:48972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:53.010529 kernel: kauditd_printk_skb: 1 callbacks suppressed May 15 10:40:53.010586 kernel: audit: type=1130 audit(1747305652.967:1514): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.55:22-10.0.0.1:48972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' May 15 10:40:53.039000 audit[5091]: USER_ACCT pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.040421 sshd[5091]: Accepted publickey for core from 10.0.0.1 port 48972 ssh2: RSA SHA256:haioSl9UPoE92ibERJujrg0rXVEisgSt061naG/EAtE May 15 10:40:53.043845 kernel: audit: type=1101 audit(1747305653.039:1515): pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.043000 audit[5091]: CRED_ACQ pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.044584 sshd[5091]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) May 15 10:40:53.048379 systemd-logind[1187]: New session 26 of user core. May 15 10:40:53.050055 kernel: audit: type=1103 audit(1747305653.043:1516): pid=5091 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.050122 kernel: audit: type=1006 audit(1747305653.043:1517): pid=5091 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 May 15 10:40:53.050146 kernel: audit: type=1300 audit(1747305653.043:1517): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff13943680 a2=3 a3=0 items=0 ppid=1 pid=5091 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.043000 audit[5091]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff13943680 a2=3 a3=0 items=0 ppid=1 pid=5091 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) May 15 10:40:53.049507 systemd[1]: Started session-26.scope. May 15 10:40:53.043000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D May 15 10:40:53.055636 kernel: audit: type=1327 audit(1747305653.043:1517): proctitle=737368643A20636F7265205B707269765D May 15 10:40:53.055869 kernel: audit: type=1105 audit(1747305653.053:1518): pid=5091 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.053000 audit[5091]: USER_START pid=5091 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.054000 audit[5093]: CRED_ACQ pid=5093 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.063319 kernel: audit: type=1103 audit(1747305653.054:1519): pid=5093 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.161613 sshd[5091]: pam_unix(sshd:session): session closed for user core May 15 10:40:53.162000 audit[5091]: USER_END pid=5091 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.164473 systemd[1]: sshd@25-10.0.0.55:22-10.0.0.1:48972.service: Deactivated successfully. May 15 10:40:53.165176 systemd[1]: session-26.scope: Deactivated successfully. May 15 10:40:53.165790 systemd-logind[1187]: Session 26 logged out. Waiting for processes to exit. May 15 10:40:53.166539 systemd-logind[1187]: Removed session 26. May 15 10:40:53.162000 audit[5091]: CRED_DISP pid=5091 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.170943 kernel: audit: type=1106 audit(1747305653.162:1520): pid=5091 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.170989 kernel: audit: type=1104 audit(1747305653.162:1521): pid=5091 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' May 15 10:40:53.163000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.55:22-10.0.0.1:48972 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'